Bookmarks Menu

Kürzlich verwendete Schlagwörter

Suchmaschinen

15 Educational Search Engines College Students Should Know About | Rasmussen College
Unbubble.eu - Suchmaschinen
Startpage.com Default Settings - The world's most private search engine
DuckDuckGo — Privatsphäre, vereinfacht.
Mojeek Deutschland
searx
Nachrichten - Suche, Twitter - Suche und Social News - Suche I Paperball
Taylor & Francis Online
dblp: computer science bibliography
BASE (Bielefeld Academic Search Engine): Basic Search
Semantic Scholar | AI-Powered Research Tool
CiteSeerX
Wolfram|Alpha: Computational Intelligence
News Reader - Nachrichtensuchmaschine

Suchmaschinen konfiguration

robots.txt - Grundlagen, Optimierung und Beispiele - IONOS
Grundlagen der Suchmaschinenoptimierung - IONOS
Eine Homepage bei Suchmaschinen kostenlos eintragen (Google, Bing)

Internet Archive: Digital Library of Free & Borrowable Books, Movies, Music & Wayback Machine
de.arxiv.org e-Print archive mirror
Wegwerf-Email von TRASH-MAIL - dem Fake-Email Provider
Temp Mail - Disposable Temporary Email

Meme Makers

Imgflip - Create and Share Awesome Images
Online Ascii Art Creator

Tenor GIF Keyboard - Bring Personality To Your Conversations

Informatik


IT Begriffe

Everything as a Service – Wikipedia
Störsender – Wikipedia
Abhörgerät – Wikipedia
Light Commands
Frequenzband – Wikipedia
Audio frequency - Wikipedia
Ultrakurzwelle – Wikipedia
Ultrasound - Wikipedia
Infrasound - Wikipedia
Visible spectrum - Wikipedia
Ultraviolet - Wikipedia
Infrared - Wikipedia
Photogrammetrie – Wikipedia
3D-Modellierungen & VR- Wie funktioniert digitale Photogrammetrie?
Comparison of photogrammetry software - Wikipedia

IT-Informationen

Basic Concepts of Networking-OSI Model and TCP/IP Model | by Amber Mishra | Medium
OSI-7-Layer-in-with-Examples
OSI-7-Layer-in-Detail
CompTIA Network+ Certification Video Course - Invidious

Programmierung

DLL Dateien

debugging - Is it possible to "decompile" a Windows .exe? Or at least view the Assembly? - Stack Overflow
What Is A DLL File and How to Open it | ComputingForGeeks
DLL Dateien öffnen – wikiHow

Html

HTML lernen und die eigene Website erstellen - HTML Kurs
What is HTTP/2 - The Ultimate Guide by Kinsta
HTTP-Statuscode – Wikipedia

Javascript

JavaScript

freeCodeCamp Programming Tutorials: Python, JavaScript, Git & More
Top 43 Programming Languages: When and How to Use Them · Raygun Blog
SS64 Command line reference
MDN-Web-Dokumentation
Regular-Expressions.info - Regex Tutorial, Examples and Reference - Regexp Patterns
Unified Modeling Language (UML) description, UML diagram examples, tutorials and reference for all types of UML diagrams - use case diagrams, class, package, component, composite structure diagrams, deployments, activities, interactions, profiles, etc.


BIOS & UEFI

BIOS-Chips - Verkauf und Programmierung - BIOS-Updates - BIOS-Reparatur | www.biosflash.com
BIOS – Wikipedia
Die Fehlercodes des Phoenix-BIOS richtig verstehen - PC-WELT
PC piept - das bedeuten die Bios-Töne - PC-WELT
Beep Codes - BIOS Fehler-Meldungen
Unified Extensible Firmware Interface – Wikipedia
Unified Extensible Firmware Interface - ArchWiki
UEFI - Community Help Wiki


Netzwerk

Netzwerkkabel verlegen

Netzwerk-HowTo: Das LAN richtig verkabeln - JACOB

Anleitung zum Konfigurieren von IPv6 in Windows für fortgeschrittene Benutzer
List of interface bit rates - Wikipedia
Mehr Surf-Tempo dank Router-Einstellungen - PC-WELT
Guidance for configuring IPv6 in Windows for advanced users
wireless networking - Can Somebody Explain About Wi-Fi Device Manager Settings And Power Settings In Windows 7? - Super User
Best Ethernet Switches of 2020 - Managed and Unmanaged – MBReviews
SpeedGuide.net :: TCP Optimizer / Downloads

Protokolle & Hardwarestandards

Welcome to The Public Listing For IEEE Standards Registration Authority
IETF Tools
Protocol Numbers
IANA — Protocol Registries
Service Name and Transport Protocol Port Number Registry
TCP/UDP Port Number List
[MS-OPENSPECLP]: Open Specifications | Microsoft Docs
GitHub - alex/what-happens-when: An attempt to answer the age old interview question "What happens when you type google.com into your browser and press enter?"

DNS

The Cable Guy - The Name Resolution Policy Table | Microsoft Docs
Secure DNS Traffic Using DNSSEC and DNS Policies - RootUsers
Fast, free and uncensored. DNS.WATCH. - DNS.WATCH
Windows installer for Stubby - DNS Privacy Project - Globale Seite
CCC | DNS Howto
OpenNIC Project
DNS-Abfragen | heise Netze
DNS over HTTPS · curl/curl Wiki · GitHub


Informationssicherheit

ISMS Erklärung

Was ist Identity- and Access Management (IAM)?
Identity & Access Management FAQ: Was Sie über IAM wissen müssen - computerwoche.de
ISMS & DSGVO: Vorteile einer Zertifizierung
Neue Goverance, Risk & Compliance (GRC) Software | GBTEC
COBIT 5: A Business Framework for the Governance and Management of Enterprise IT
Was ist Data Loss Prevention (DLP)? - Definition von WhatIs.com
Serverräume oft nicht gegen physischen Gefahren abgesichert
Moderne Verfahren der Kryptographie: Von RSA zu Zero-Knowledge: Amazon.de: Albrecht Beutelspacher, Jörg Schwenk, Klaus-Dieter Wolfenstetter: Bücher
Allgemeine Verwaltungsvorschrift über das Meldeverfahren gemäß § 4 Abs. 6 BSIG
Physische Absicherung der IT-Infrastruktur: Das Rechenzentrum als latentes Risiko - channelpartner.de
IT-Leiter als Datenschutzbeauftragter – Bußgeld droht - BDO
Datenschutz-Tipp Nr. 14: Welcher Mitarbeiter darf nicht Datenschutzbeauftragter werden?
Datenschutzbeauftragter darf keinen Interessenkonflikten unterliegen | Externer Datenschutzbeauftragter DS-GVO

Saltzer and Schroeder, The Protection of Information in Computer Systems

Frameworks

Home · Mobile Threat Catalogue
MITRE ATT&CK™
Cybersecurity Framework | NIST
FAQ MITRE ATT&CK: So nutzen Sie das IT-Security-Framework - computerwoche.de
BadgeApp
Capability Maturity Model Integration – Wikipedia


ISIS12

Was ist ISIS12? – ISIS12


ISO2700X

ISO 2700x :: ISO 2700x :: ITWissen.info
ISO 27001 Risk Assessment Methodology – How to write this document
Praxisbuch ISO/IEC 27001: Management der Informationssicherheit und Vorbereitung auf die Zertifizierung. Zur Norm ISO/IEC 27001:2015: Amazon.de: Michael Brenner, Nils Felde, Wolfgang Hommel, Stefan Metzger, Helmut Reiser, Thomas Schaaf: Bücher
Onlinesicherheit - ISO/IEC 27000 - ISMS-Normenreihe
Überblick über ISO 27001:2013 Anhang A – Projekt29 GmbH&Co.KG
About ISO27k
BSI - ISO 27001-Zertifizierung Zertifizierungsschema
Free List of Information security threats and vulnerabilities
FAQ | LinquaCert - ISO17100-ISO18587-Verfahren-Prozesse


BSI Grundschutz

Kritis - Sektorstudien
ACS - Startseite
Über das Cluster - Bayerischer IT-Sicherheitscluster
BSI - Hochverfügbarkeitskompendium - Hochverfügbarkeitskompendium
BSI - Publikationen
BSI - IT-Grundschutz - BSI-Standards
BSI - Bausteine
BSI - IT-Grundschutz - BSI-Standards - Umsetzungsrahmenwerk zum Notfallmanagement nach BSI-Standard 100-4
IT-Grundschutz: BSI schließt Modernisierung ab | heise Security
BSI-Lagezentrum und CERT-Bund – SecuPedia
BSI - ISO 27001-Zertifikate auf der Basis von IT-Grundschutz - ISO 27001 auf der Basis von IT-Grundschutz
BSI - ISO 27001-Zertifikate auf der Basis von IT-Grundschutz
OWASP
komfit-blog.de – Der KomFIT-Blog
Bundesamt für Bevölkerungsschutz und Katastrophenhilfe - Downloads - Sektoren- und Brancheneinteilung Kritischer Infrastrukturen
BSIFB - Anleitung zur Nutzung von DBAN
Änderungen bei IT-Grundschutz: Folgen für die Zertifizierung

BSI - Mindeststandards Bund
BSI - Startseite IS-Revision

IT-Security Tools

RIPE Network Coordination Centre
denic.de: WebWhois
DNS-Abfragen | heise Netze
Shodan
Censys
SSL Server Test (Powered by Qualys SSL Labs)
Wappalyzer – Get this Extension for 🦊 Firefox (en-US)
Analysiere | Webbkoll - dataskydd.net
VirusTotal
EU-Cleaner · botfrei
CVE security vulnerability database. Security vulnerabilities, exploits, references and more
Home Updater Overview | Patch My PC
Wo speichert Outlook meine Daten? - Outlook Blog
All Sites - Stack Exchange
Traceroute Tool
robots.txt - Grundlagen, Optimierung und Beispiele - IONOS
Onlinesicherheit
Informationssicherheit Seminar (TÜV) online buchen | TÜV SÜD GRUPPE | TÜV SÜD Akademie
VDA - VDA
Security Engineering - A Guide to Building Dependable Distributed Systems

Top 6 der erfolgreichen Ransomware-Familien
Beuth Verlag - Normen und Fachliteratur seit 1924
Purism – High-quality laptops that protect your freedom and privacy
Fluktuationskostenrechner | HUMANQUEST
DIN 66399 - Schutzklassen und Sicherheitsstufen | TÜV SÜD GRUPPE
ID Ransomware

Security Information & Event Management SIEM

Was ist Security Information and Event Management (SIEM)? - Definition von WhatIs.com
What is SIEM? A Complete Beginner's Guide - Varonis

Awareness

Cyber Risk | Coruscan - Awareness Test
For Everyone - PagerDuty Security Training
Downloads | Anti-Prism-Party
Academic: Attack Trees - Schneier on Security

Audit_Tools

Das Open Source ISMS | verinice.
Support-Seiten | verinice.
Fünf Tipps für die Auswahl von System-Management-Tools


DSGVO

Datenschutz-Grundverordnung (EU-DSGVO) als übersichtliche Website
.: Österreichisches Informationssicherheitshandbuch :.

DatenschutzHilfe

Social Media Guidelines Beispiele - Social-Media-Guidelines.com
DSGVO: Checkliste für datenschutzkonforme Messenger für Unternehmen
Datenschutzerklärung – Andreas W. Ditze
Einwilligungserklärung (inkl. Muster) | Datenschutz 2018
Datenschutzgrundverordnung - Das sind die Neuerungen
DSGVO: Ende der Verpflichtung auf das Datengeheimnis für Mitarbeiter?
Erste deutsche Positivlisten für die Datenschutz-Folgenabschätzung
DSGVO Datenschutzbeauftragter: Bestellung + Aufgaben, Extern vs Intern
Dokumentenübersicht | Muster-Vorlagen | DSGVO | Consulio GmbH

DatenschutzinfosPräsentation

Deutschland sicher im Netz e.V. | Gemeinsam für mehr IT-Sicherheit
https://www.lda.bayern.de/tool/start.html#
Personenbezogene Daten als Rohstoff und Handelsware - Registriert, gezählt, verwertet
World’s Biggest Data Breaches & Hacks — Information is Beautiful
Datenschutz: Der Datenschatten von Malte Spitz - SPIEGEL ONLINE
Vorratsdaten: Verräterisches Handy | ZEIT ONLINE
Warum kleine Unternehmen diese Systeme zur Fahrzeugortung unbedingt haben wollen | Expert Market
Strava Global Heatmap

Privatsphäre Tools

Kuketz IT-Security Blog ⋆ IT-Sicherheit | Datenschutz | Hacking
Bildungswesen: Entlarvung der häufigsten Microsoft-Mythen ⋆ Kuketz IT-Security Blog
privacy tools - Verschlüsselung gegen globale Massenüberwachung 🔒
Privacy-Handbuch
Software for Privacy - AlternativeTo.net
Fünf Wege, um Dateien zu verstecken - com! professional
So schützen Sie Ihren USB-Stick - com! professional
Downloads | Anti-Prism-Party
About:config entries - MozillaZine Knowledge Base
GitHub - pyllyukko/user.js: user.js -- Firefox configuration hardening
GitHub - ghacksuserjs/ghacks-user.js: An ongoing comprehensive user.js template for configuring and hardening Firefox privacy, security and anti-fingerprinting
BugMeNot: share logins
CCC | DNS Howto
Fast, free and uncensored. DNS.WATCH. - DNS.WATCH
Mozilla Observatory
Analysiere | Webbkoll - dataskydd.net
Wappalyzer – Get this Extension for 🦊 Firefox (en-US)
Qualys SSL Labs
Webtracking Check - Fraunhofer SIT
Hardenize: Comprehensive web site configuration test
CryptCheck
Welcome - PrivacyScore
What · Exodus Privacy
εxodus
Wo speichert Outlook meine Daten? - Outlook Blog
https://www.emailprivacytester.com/
PrivacyMail
How to: Use PGP for Windows | Surveillance Self-Defense
Wegwerf-Email von TRASH-MAIL - dem Fake-Email Provider
Unbubble.eu - Suchmaschinen
Suchmaschinen Liste | Alternativen zu Google im Überblick - 1&1
What are the alternatives to Google Maps? - IONOS
OpenStreetMap Deutschland: Homepage
OpenStreetMap
Where Would You Go If YouTube Died? 7 YouTube Alternatives
Alternativen zu Youtube: Was läuft auf den Dritten und welche Portale nutzen Sie?
The best software to protect your privacy | Security | Techworld
Comparison of web browsers - Wikipedia
Mobile browser - Wikipedia
Comparison of cross-platform instant messaging clients - Wikipedia
Alternativen zu WhatsApp: Diese Messenger-Dienste gelten als sicher | General-Anzeiger Bonn
Android - Comparison OpenStreetMap Apps
Comparison of operating systems - Wikipedia
Comparison of mobile operating systems - Wikipedia
GLONASS: Die GPS-Alternative aus Russland - teltarif.de Ratgeber
WP internals
Wie ist meine IP Adresse und mein Standort? - dein-ip-check.de

RFID Schutz » Wie du Dich vor unbefugtem Auslesen schützen kannst
Stop Windows 10 spying on you using just Windows Firewall
DoNotSpy10 (Do Not Spy für Windows 10) - Download - CHIP
Easily Edit the Hosts File in Windows 10 - Petri
Telemetrie-Datenübertragungen in Windows 10 Home und Pro komplett deaktivieren - Anleitung
Signal Review | Is it worth it? - ProPrivacy.com

Liste von Betriebssystemen – Wikipedia
Liste von GUI-Bibliotheken – Wikipedia

Windows Server


Dokumentationen

Microsoft Docs · GitHub
GitHub - jeffpar/kbarchive: Microsoft KnowledgeBase Archive
Windows Blog Archive - Microsoft Tech Community
Frequently asked questions - MSDN Search
Browse all - Learn | Microsoft Docs
Technische Dokumentation | Microsoft Docs
Windows Server-Dokumentation: Microsoft-Dokumentation | Microsoft Docs
Dokumentation zu früheren Versionen von Windows | Microsoft Docs
Windows previous versions documentation | Microsoft Docs
Windows 10 Enterprise Security - Microsoft 365 Security | Microsoft Docs
Microsoft-Dokumentation zur Sicherheit - Security documentation | Microsoft Docs
Security and Identity - Win32 apps | Microsoft Docs
Azure Enterprise Mobility + Security-Dokumentation | Microsoft Docs
Windows-Dokumentation | Microsoft Docs
Overview of Driver Technologies - Windows drivers | Microsoft Docs
Network Driver Design Guide - Windows drivers | Microsoft Docs
Device Tree - Windows drivers | Microsoft Docs
Powershell, VB Script, SQL and JavaScript - TechNet IT Pro's and Scripting Guys
SANS Institute: Reading Room - Categories


TechGenix Product Directory - TechGenix
SS64 Command line reference
Windows Batch Scripting - Wikibooks, open books for an open world
Environment variable - Wikipedia
Recognized Environment Variables (Windows 10) - Windows Deployment | Microsoft Docs
Complete list of environment variables on Windows 10 • Pureinfotech

PowerShell

PowerShell Documentation | Microsoft Docs
Windows 10 and Windows Server 2016 | Microsoft Docs
Konzeptionelle Hilfethemen für Windows PowerShell Core | Microsoft Docs
about_Hash_Tables_and_other_Functions | Microsoft Docs
Windows PowerShell Tutorial: PowerShell Script ausführen
Skripte in der PowerShell: Ein Einsteigerguide - PC-WELT

Desired State Configuration

Windows PowerShell DSC – Übersicht - PowerShell | Microsoft Docs
GitHub - PowerShell/DscResources: Central repository for PowerShell Desired State Configuration (DSC) resources.


PowerShell-Logging
Wissenswertes | German PowerSHELL

Releases · PowerShell/PowerShell · GitHub
PowerShell Gallery | Home

CMD

Windows-Befehle | Microsoft Docs
Windows commands | Microsoft Docs
Die wichtigsten CMD-Befehle für Windows zur Netzwerk-Analyse - PC-WELT
Windows CMD commands: A list of command prompt codes - IONOS
[gelöst] - Alle CMD Befehle auf einen Blick | Dr. Windows
How to run Control Panel tools by typing a command
cmd Befehl Windows Verwaltung: Systemsteuerung cpl und msc
Liste der Windows-Befehle - CCM
Bereiche der Systemsteuerung direkt starten
Windows Konsolen und Systemsteuerung über Kommandozeile per Befehl starten
Windows 10: .cpl, .msc und andere Befehle » bits meet Bytes
Starten der Windows-Einstellungs-App - UWP applications | Microsoft Docs
Kommandozeilen-Befehl in ausführbarer Datei speichern - PC-WELT
Akkuzustand und Akkulaufzeit - Powercfg - Mein-Surface.de
How to Change Process Priority in Windows 10
Prozesse dauerhaft Priorisieren Windows 10 Deskmodder Wiki

List of Microsoft Windows components - Wikipedia
System32-Files explained - Workspace Virtualization - Symantec Enterprise
Where are drivers for installed printers stored on disk in Windows?


General Fixes

Windows Server Evaluation verlängern - Bitpage.de - Der Technikblog
Herunterfahren Button im Windows Anmeldebildschirm anzeigen oder ausblenden » Anmeldung, Option, Registry » Windows FAQ
F8 Taste wieder aktivieren um in den Abgesicherten Modus zu kommen – Adminweb.at – Daniel's IT-Blog
Windows 10 im abgesicherten Modus starten | TECH FAQ

Troubleshooting-Admintools

Wiki - TechNet Wiki
Featured Articles - TechNet Articles - United States (English) - TechNet Wiki
Frequently asked questions - MSDN Search
Microsoft-Support
Windows-Befehle | Microsoft Docs
Freeware Tools and System Utilities for Windows
Optionale Features installieren unter Windows - www.itnator.net
Path Length Checker - Pfade einer Datei mit mehr als 256 Zeichen aufspüren | Deskmodder.de
Wiederherstellen verlorener oder gelöschter Dateien
Schattenkopien (Vorgängerversionen) unter Windows Server konfigurieren | WindowsPro
Windows 10: Probleme mit Offline-Dateien bei aktiviertem FastBoot - Bents Blog

Microsoft Office

Office-Fehlerbehebung für Administratoren und IT-Spezialisten - Outlook | Microsoft Docs
Office troubleshooting for admins and IT professionals - Office | Microsoft Docs
Microsoft Office-Hilfe & -Schulung
Korrekturen oder Problemumgehungen für aktuelle Probleme in Office - Office-­Support
Scannen mithilfe des Microsoft-Support- und Wiederherstellungs-Assistenten - Outlook | Microsoft Docs
Auflisten einiger Probleme für Office-Produkte | Microsoft Docs
Profileinstellungen von Outlook 2007/2010 sichern - PC-WELT
Einführung in Outlook-Datendateien (PST und OST) - Outlook
Exportieren oder Sichern von E-Mails, Kontakten und Kalender in einer Outlook-PST-Datei - Office-­Support
Was ist eine PST-Datei in Outlook? Definition & Bedeutung - IONOS
Outlook startet nicht | Alle Lösungswege einfach erklärt - IONOS
Outlook: Gelöschte E-Mails wiederherstellen - IONOS
5 Common Microsoft Outlook Issues and Their Solutions
How to troubleshoot and fix common problems in Outlook | Windows Central
Repair Outlook Data Files (.pst and .ost) - Outlook
Verwalten von PST-Dateien in Microsoft Outlook - Outlook | Microsoft Docs
Unterschied zwischen PST-Datei, PST-Archiv und OST-Dateien
Microsoft Outlook: Speicherort von PST-Dateien ändern - Tipps & Tricks
About the Microsoft Support and Recovery Assistant - Office Support
Informationen zum Kalender Überprüfungs Tool für Outlook (CalCheck)

How to Fix Copy and Paste Not Working in Windows 10 - Make Tech Easier
Copy and paste not working Issue. - Windows 10 - SuperTechman
Support und häufig gestellte Fragen | DLL‑files.com
Fehlende DLL-Dateien kostenlos herunterladen | DLL‑files.com
Ntdll.dll reparieren – so geht's
Windows 10 reparieren mit DISM, SFC und USB-Stick
How to use DISM command tool to repair Windows 10 image | Windows Central
Windows 10 reparieren wiederherstellen mit DISM Inplace Upgrade und vielen weiteren Varianten Deskmodder Wiki
Use DISM to fix issues SFC can't - gHacks Tech News
Alleskönner: Das Windows-Tool DISM im Überblick | Borns IT- und Windows-Blog
Security Update Guide - Microsoft Security Response Center
Protokolldateien und Beheben von Upgradefehlern - Windows Deployment | Microsoft Docs
Status des Windows-Release | Microsoft Docs
Windows 10 update history
Update-Probleme bei Windows: Was Sie tun können - computerwissen.de
Behandeln von Problemen bei der Aktualisierung von Windows 10
Windows Update Troubleshooter for Windows 10
How to temporarily prevent a Windows Update from reinstalling in Windows 10
How to fix Windows Update problems on Windows 10 | Windows Central
How to fix Windows Update problems in Windows 10
How to fix Windows Update problems in Windows 10
Windows-Update funktioniert nicht? So reparieren Sie (fast) jeden Fehler - PC-WELT
Windows-Update reparieren - so geht's
PC-WELT-Fix Windows Update - PC-WELT
Troubleshooting Group Policies - Andy's Tech Blog
Group Policy: Basic troubleshooting steps for beginners - TechNet Articles - United States (English) - TechNet Wiki
Group Policy Troubleshooting – helpful Event log categories | Microsoft Docs
GPO-Fehlersuche: Logging für Gruppenrichtlinien aktivieren | WindowsPro
Fehler in Gruppenrichtlinien: So finden Sie die Ursache
RSoP, gpresult, PowerShell: Ergebnisse für GPOs prüfen | WindowsPro
Troubleshooting Group Policy - Windows 7 Tutorial
Group Policy Log View: Fehler bei GPO-Ausführung finden | WindowsPro
How to enable GPO logging on windows 7 /2008 r2 ? | Microsoft Docs
Troubleshooting Group Policy Using Event Logs | Microsoft Docs
4 Steps to Troubleshooting Group Policy | Specops Software
Mit der Windows-Zuverlässigkeitsüberwachung Softwareprobleme identifizieren | Dell Deutschland
Windows Task Manager: The Complete Guide
GitHub - lucasg/Dependencies: A rewrite of the old legacy software "depends.exe" in C# for Windows devs to troubleshoot dll load dependencies issues.
Windows Admin: Using Task Scheduler to Run Processes Later
Troubleshooting Information for Windows Events
Windows Security Log Encyclopedia
Fehlermeldungen in Windows 10 auswerten mit dem Microsoft Error Lookup Tool | WindowsPro
System Error Codes - Win32 apps | Microsoft Docs
Microsoft Safety Scanner Download - Windows security | Microsoft Docs
DISM - Deployment Image Servicing and Management Technical Reference for Windows | Microsoft Docs
Problembehandlung bei Windows Server | Microsoft Docs
Advanced troubleshooting for Stop error or blue screen error issue - Windows Client Management | Microsoft Docs
Windows BlueScreen-Analyse – Teil 3 | Borns IT- und Windows-Blog
Windows 10 Won't Boot? 12 Fixes to Get Your PC Running Again
What You Should Do If Windows 10 Fails to Start - Make Tech Easier
Windows 10 Won't Boot? Fix it with Startup Repair and BootRec Commands
Use Bootrec.exe in the Windows RE to troubleshoot startup issues
Windows Troubleshooting for Dummies
Troubleshooting Windows - CompTIA A+ 220-1002 - 3.1 - Invidious
Operating System Troubleshooting - CompTIA A+ 220-902 - 4.1 - Invidious
Troubleshooting PKI Problems on Windows Vista | Microsoft Docs
Sysprep (System Preparation) Overview | Microsoft Docs
Sysprep fails after you remove or update Microsoft Store apps that include built-in Windows images
Windows 10 SDK – Entwicklung von Windows-Apps
[MS-WININTBLOGLP]: Microsoft Message Analyzer Blog | Microsoft Docs
Download Group Policy Log View from Official Microsoft Download Center
Sysinternals Suite - Windows Sysinternals | Microsoft Docs
NotMyFault - Windows Sysinternals | Microsoft Docs
Download Microsoft Network Monitor 3.4 (archive) from Official Microsoft Download Center
Download and install the Windows ADK | Microsoft Docs

Debugging

SysInternals Pro: Understanding Process Monitor
SysInternals Pro: Understanding Process Explorer
SysInternals Pro: Using Autoruns
Windows BlueScreen-Analyse – Teil 3 | Borns IT- und Windows-Blog
WinDbg - Wikipedia EN
Symbol information for Windbg
Good tutorial for WinDbg? - Stack Overflow
WinDBG - The Basics for Debugging Crash Dumps in Windows 10 | Tutorials
WinDbg-Samples/tutorial-instructions.md at master · microsoft/WinDbg-Samples · GitHub
Windows Debugging and Troubleshooting - Invidious
Case Of The Unexplained - Invidious
TechEd 2013: Case of the Unexplained 2013: Windows Troubleshooting with Mark Russinovich - Invidious
Windows 10 Architecture: Unlock troubleshooting secrets - Invidious
Overview of Windows Components - Windows drivers | Microsoft Docs
Sysinternals Utilities - Windows Sysinternals | Microsoft Docs
[MS-PROTOCOLSLP]: Protocols | Microsoft Docs


Grundlegende Administrative Aufgaben

How to manage time servers on Windows 10 | Windows Central
pool.ntp.org: the internet cluster of ntp servers

Absichern Windows Server

GitHub - PaulSec/awesome-windows-domain-hardening: A curated list of awesome Security Hardening techniques for Windows.
Recommendations for TLS/SSL Cipher Hardening | Acunetix
Cipher Suites in TLS/SSL (Schannel SSP) - Win32 apps | Microsoft Docs
Windows 10 Enterprise Security - Microsoft 365 Security | Microsoft Docs
Threat Protection (Windows 10) - Windows security | Microsoft Docs
How Windows Hello for Business works - Microsoft 365 Security | Microsoft Docs
Übersicht über die BitLocker-Geräteverschlüsselung in Windows10 - Microsoft 365 Security | Microsoft Docs
Schützen des privilegierten Zugriffs – Referenzmaterial | Microsoft Docs
Saltzer and Schroeder, The Protection of Information in Computer Systems
Microsoft Defender Advanced Threat Protection - Windows security | Microsoft Docs
AdminSDHolder, Protected Groups und SDPROP | Microsoft Docs
Schützen deiner Organisation mit Arbeitsstationen mit privilegiertem Zugriff | Microsoft Docs
TechNet Privileged Access Workstation (PAW) Content
Authentifizierungsrichtlinien und Authentifizierungsrichtliniensilos | Microsoft Docs
Deploy shielded VMs | Microsoft Docs
So wird’s gemacht: Festlegen von Netzwerkfunktionen (HTML) - Windows app development | Microsoft Docs
Setting up a Source Initiated Subscription - Win32 apps | Microsoft Docs
Microsoft account | Microsoft Account Privacy Settings
Handbuch für Windows Store für Unternehmen – Setup, Apps verwalten | Microsoft Docs
Desktop Analytics - Configuration Manager | Microsoft Docs
Dev guide - Search provider discovery - Microsoft Edge Development | Microsoft Docs
Windows Defender Application Guard (Windows10) - Windows security | Microsoft Docs
Making Microsoft Edge the most secure browser with Windows Defender Application Guard - Microsoft Security
Konfigurieren von Cortana mit Gruppenrichtlinien-und MDM-Einstellungen (Windows 10) - Configure Windows | Microsoft Docs

Download Microsoft Security Compliance Manager 4.0 from Official Microsoft Download Center
Download Microsoft Security Compliance Toolkit 1.0 from Official Microsoft Download Center
Microsoft Baseline Security Analyzer – Wikipedia
Download Windows 10 and Windows Server 2016 security auditing and monitoring reference from Official Microsoft Download Center
TechNet Microsoft Advanced Threat Analytics Sizing tool - Version 3.7.0
Wecutil.exe - Win32 apps | Microsoft Docs
LAPS | Microsoft Docs
GitHub - api0cradle/UltimateAppLockerByPassList: The goal of this repository is to document the most common techniques to bypass AppLocker.
GitHub - kasif-dekel/Microsoft-Applocker-Bypass: A new technique to bypass microsoft's applocker.

Registry

Registrierungsdatenbank – Wikipedia
Windows User SID (Sicherheitskennungen) von allen Usern auslesen » Account, Befehl, User, WMIC » Windows FAQ
Total Registry - Infoguide rund um die Registry - WinTotal.de
Die Windows Registrierung im Überblick - das Herz von Windows
Defekte Netzwerkanzeige reparieren - so geht's - PC-WELT
WinFAQ - Download der WinFAQ

Firewall

Comparison of firewalls - Wikipedia
Firewall FAQ: Was kann welche Firewall - computerwoche.de
Intrusion detection system - Wikipedia
Security information and event management - Wikipedia
Liste der standardisierten Ports – Wikipedia
Spezielle Ports | heise Security
Kaspersky Cyberthreat-Echtzeitkarte
Network intrusion detection system and analysis
Comodo Internet Security Help Guide
Kaspersky Online Help
Fortinet Documentation Library
Sophos Product Support and Documentation | Sophos Customer Resource Centers
Download pfSense Community Edition
Windows Firewall with Advanced Security (Guide for Vista) | Wilders Security Forums

Schadsoftware

Microsoft Safety Scanner Download - Windows security | Microsoft Docs
VirusTotal - Wikipedia
Comparison of antivirus software - Wikipedia
Was ist Ransomware? | F-Secure
Malware: Was ist das und welche Arten gibt es? - NETZWELT
A Window into Malicious Advertising - 61% of malvertising targets Windows devices — DEVCON | Cybersecurity for the Web

Protokollierung

Problembehandlung und Protokolldateien der Bereitstellung | Microsoft Docs
Protokolldateien und Beheben von Upgradefehlern - Windows Deployment | Microsoft Docs
Welche Log Datei bei Update Fehler auslesen Windows 10 Deskmodder Wiki
Windows-Fehlersuche per Ereignisanzeige - so geht's - PC-WELT
Use Custom Views from Windows Event Viewer in PowerShell | Scripting Blog
Best Practices: Event Log Management for Security and Compliance
windows event viewer Best prac... - Invidious

Monitoring

Surveillance - Wikipedia
Überwachungskamera außen: 10 wertvolle Tipps für einen sicheren Kauf
Rechtliche Grundlagen der Videoüberwachung in Deutschland
Rechtliche Regelungen zur Videoüberwachung
Windows Security Log Encyclopedia
Using Event Viewer with AppLocker (Windows 10) - Windows security | Microsoft Docs
PowerShell-Logging
Which Windows Server Events Should You Monitor and Why? | BeyondTrust
Top 11 Windows Audit Policy Best Practices
Monitoring what matters - Windows Event Forwarding for everyone (even if you already have a SIEM.) | Microsoft Docs
Hyper-V Performance Monitoring: Virtuelle Umgebung im Blick
How To: Monitor Hyper-V with Nagios
Hyper-V Monitor Gadget - CodePlex Archive
ManageEngine - IT Operations and Service Management Software


Windows Packing

Entwerfen von Windows 10-Geräten | Microsoft Docs

Windows 10: Installation mit eigenen Programmen anpassen - Invidious
VHD Attach - Download - Kostenlos & schnell auf WinTotal.de
Win Toolkit Download - Windows 10 Disc anpassen
Dism++ 10.1.1000.100 Sommer Update steht zum Download bereit | Deskmodder.de

Windows Admin Center

Windows Admin Center Overview | Microsoft Docs
Gallery | MyGet

Microsoft Desktop Optimization Pack

Informationen zu MDOP/ AGMP | Microsoft Docs


Patchmanagement-WSUS

https://www.microsoft.com/en-us/msrc/technical-security-notifications
Antary Windows Patchday etc.
Search product lifecycle
Übersicht über Windows as a Service (Windows10) - Windows Deployment | Microsoft Docs
Erste Schritte mit Windows Server Update Services (WSUS) | Microsoft Docs
Konfigurieren von Klassifizierungen und Produkten - Configuration Manager | Microsoft Docs
Description of the standard terminology that is used to describe Microsoft software updates
Step 4 - Configure Group Policy Settings for Automatic Updates | Microsoft Docs
Windows Update-Problembehandlung - Windows Deployment | Microsoft Docs

Download MICROSOFT REPORT VIEWER 2012-LAUFZEIT from Official Microsoft Download Center
Download Microsoft® SQL Server® 2012 SP3 Feature Pack from Official Microsoft Download Center
GitHub - proxb/PoshWSUS: PowerShell module to manage Windows Server Update Services (WSUS)

Lizenzierung

Licensing Terms | Microsoft Volume Licensing
Automatic Virtual Machine Activation | Microsoft Docs
KMS-Clientsetupschlüssel | Microsoft Docs


ActiveDirectory

Active Directory FAQ - Blog der FirstAttribute Gruppe
Verzeichnisdienst – Wikipedia
Windows NT Benutzergruppen | Trusted Windows
Windows-Gruppen richtig nutzen | faq-o-matic.net
HOWTO: Disable weak protocols, cipher suites and hashing algorithms on Web Application Proxies, AD FS Servers and Windows Servers running Azure AD Connect - The things that are better left unspoken
Top 25 Active Directory Security Best Practices
Active Directory Academy
Creating, Maintaining, and Monitoring a Security Hardening for Windows Active Directory and Servers
Windows Server 2016: Temporäre Mitgliedschaft in administrativen Gruppen konfigurieren | WindowsPro
Active Directory Best Practices - Ten Years Later - Invidious
Windows User SID (Sicherheitskennungen) von allen Usern auslesen » Account, Befehl, User, WMIC » Windows FAQ
Active directory Schema All Attributes - Win32 apps | Microsoft Docs
Using Ntdsutil Tool to Manage Active Directory – TheITBros
Appendix O: Active Directory Delegation Wizard File | Microsoft Docs
Dynamische Zugriffssteuerung: Szenarioübersicht | Microsoft Docs
Protected Users Security Group | Microsoft Docs
Clean Up Server Metadata | Microsoft Docs
Deep Dive: Active Directory ESE Version Store Changes in Server 2019 | Ask the Directory Services Team
goSecurity BLOG: gMSA - die Lösung für das Service Account Dilemma - goSecurity AG
WS IT-Solutions · Group Managed Service Accounts mit einer GUI steuern: gMSA-Admin
Lab of a Penetration Tester: How NOT to use the PAM trust - Leveraging Shadow Principals for Cross Forest Attacks
How Shadow Principals works in Active Directory 2016 | Secure Identity
Das ESAE-Modell: Basics & Planung | FB Pro GmbH

Download Active Directory Replication Status Tool from Official Microsoft Download Center
Free Active Directory Tools from ManageEngine ADManager Plus - Index
GitHub - canix1/ADACLScanner: Repo for ADACLScan.ps1 - Your number one script for ACL's in Active Directory

NT LAN Manager - Wikipedia EN
NTLM – Wikipedia DE

Kerberos

How Interactive Logon Works | Microsoft Docs
How the Kerberos Version 5 Authentication Protocol Works: Logon and Authentication | Microsoft Docs
Kerberos Survival Guide - TechNet Articles - United States (English) - TechNet Wiki
TechNet Reset the krbtgt account password/keys

GroupPolicy

How things work: Group Policy Processing | Specops Software
Group Policy Team Blog | Microsoft Docs
Leitfaden für den Gruppenrichtlinien -Editor : Konfigurieren und Verwenden
Group Policy Administrative Templates
Group Policy Search
Group Policy Search
Group Policy Best Practices
Group Policy Survival Guide - TechNet Articles - United States (English) - TechNet Wiki
MS16-072: Security update for Group Policy: June 14, 2016
Device identification strings - Windows drivers | Microsoft Docs
An update is available to enable the use of Local ADMX files for Group Policy Editor
DCOM Machine Access Restrictions in Security Descriptor Definition Language (SDDL) syntax (Windows 10) - Windows security | Microsoft Docs
User Account Control Group Policy and registry key settings (Windows 10) - Microsoft 365 Security | Microsoft Docs
Verwalten des Startmenü- und Taskleisten-Layouts in Windows 10 (Windows10) - Configure Windows | Microsoft Docs
WMI Reference - Win32 apps | Microsoft Docs
Windows Management Instrumentation - Wikipedia
SCCM and WMI Query to Find All Laptops and Desktops | Windows OS Hub
Gruppenrichtlinien in Windows Server - Invidious
holger voges - Invidious
Netz-Weise Tipps & Doks
Gruppenrichtlinien in Windows 10
Alle Artikel - Gruppenrichtlinien by Mark Heitbrink
Group Policy Central
MDM and GP Answers View Blog

Download ADMX Migrator from Official Microsoft Download Center
Microsoft Group Policy Analyzer: Analyze Group Policy Objects
New tool: Policy Analyzer - Microsoft Tech Community - 701049
GPO Freeware Downloads | SDM Software
Windows Installer - Win32 apps | Microsoft Docs
Releases · vinaypamnani/wmie2 · GitHub
AppDeploy Repackager Community
SuperOrca | heise Download
Scalable Smart Packager CE | heise Download
SysPro Software -> Policy Reporter
WiX Toolset
Advanced Group Policy Management - Microsoft Desktop Optimization Pack | Microsoft Docs
Running AGPM with a Managed Service Account (MSA or gMSA) | Microsoft Docs
Forcing Domain Admins to use AGPM (but not really) | Microsoft Docs

Active Directory Verbundsdienste

Microsoft Azure

Azure-Dokumentation | Microsoft Docs
Azure Architecture Center - Azure Architecture Center | Microsoft Docs
VPN mit Azure MFA unter Verwendung der NPS-Erweiterung – Azure Active Directory | Microsoft Docs
Azure Kubernetes Service (AKS) | Microsoft Azure

Microsoft Intune – Wikipedia

Virtualisierung

Virtualisierung | Microsoft Docs
Netzwerk | Microsoft Docs
Hyper-V Cmdlets | Microsoft Docs
Liste von Virtualisierungsprodukten – Wikipedia
7 of the Best Sandbox Applications for Windows 10 - Make Tech Easier
Supported Windows guest operating systems for Hyper-V on Windows Server | Microsoft Docs
System Anforderungen für Hyper-V unter Windows Server | Microsoft Docs
Planen der Hyper-V-Sicherheit in Windows Server | Microsoft Docs
SR-IOV VF Failover and Live Migration Support - Windows drivers | Microsoft Docs
Hyper-V Virtual NUMA Overview | Microsoft Docs
Installing and Configuring MPIO | Microsoft Docs
Bestimmen der geeigneten Auslagerungsdateigröße für 64-Bit-Versionen von Windows - Windows Client Management | Microsoft Docs
Geschütztes Fabric und abgeschirmte VMs | Microsoft Docs
Windows Server 2012 File Server Tip: Enable CSV Caching on Scale-Out File Server Clusters | Microsoft Docs
InfiniBand – Wikipedia
Network Recommendations for a Hyper-V Cluster in Windows Server 2012 | Microsoft Docs
Data center bridging - Wikipedia
Remotezugriff auf den direkten Speicher (RDMA) und Switch Embedded Teaming (SET) | Microsoft Docs
Unterstützte Windows-Gast Betriebssysteme für Hyper-V unter Windows Server | Microsoft Docs
Hyper-V generation 2 virtual machines – part 1 | Microsoft Docs
Sollte ich einen virtuellen Computer der Generation 1 oder 2 in Hyper-V erstellen? | Microsoft Docs
Unterstützte virtuelle Linux-und FreeBSD-Computer für Hyper-V unter Windows | Microsoft Docs
Upgrade virtual machine version in Hyper-V on Windows 10 or Windows Server | Microsoft Docs
Label Schema | Bringing Structure To Labels
Set-KCD; configuring Kerberos Constrained Delegation (KCD) | Microsoft Docs
Quality of Service für Speicher | Microsoft Docs
Hyper-V: Live Migration Network Configuration Guide | Microsoft Docs
VMware – Wikipedia
VMware Docs Home
VMware Products | Build Your Digital Foundation
VMware Tools Index of /45848/tools/esx

GitHub - CharbelNemnom/Virtualization-Documentation at 53534a7908f38e6c94f639320b7330e757324dac
Script Hyper-V Performance Monitor Tool (PowerShell)
Download BizTalk Server 2006 R2 Retired Technical documentation from Official Microsoft Download Center
Download VHDX Format Specification v1.00 from Official Microsoft Download Center
Download Linux Integration Services Version 4.1 for Hyper-V from Official Microsoft Download Center
Download Remoteserver-Verwaltungstools für Windows 10 from Official Microsoft Download Center
Download Nano Server Image Builder (1.0.78) from Official Microsoft Download Center
Download Windows Management Framework 5.0 (Superceeded by WMF 5.1 RTM version: http://aka.ms/wmf5download) from Official Microsoft Download Center
Script Convert-WindowsImage.ps1 — WIM2VHD for Windows 10 (also Windows 8 and 8.1)
GitHub - microsoft/Docker-PowerShell: PowerShell Module for Docker
Enterprise Kubernetes Management | Rancher
Portainer Management, Docker User Interface, Container Software - Auckland, Singapore, San Francisco | Emerging Technology Partners
KVM-Virtual-Machine-Solution


Dateiserver

Distributed File System - Win32 apps | Microsoft Docs
Upgrading Your SYSVOL to DFS-R Replication | Microsoft Docs
BranchCache | Microsoft Docs
So stellen Sie Dateiserver hochverfügbar bereit
Carsten Rachfahl Scale-Out-Fileserver- Invidious
Download SYSVOL Replication Migration Guide: FRS to DFS Replication from Official Microsoft Download Center

Speichertechnologien

Master Boot Record – Wikipedia
GUID Partition Table – Wikipedia
Liste von Dateisystemen – Wikipedia
Dateisystem – Wikipedia
Dateisysteme - Das steckt hinter NTFS und Co. - PC-WELT
Linux-Partitionen unter Windows › Wiki › ubuntuusers.de
Speicher-DFS-iSCSI-S2D-StorageSpaces | Microsoft Docs
Übersicht über Speicherreplikate | Microsoft Docs
Storage Spaces: Frequently Asked Questions (FAQ) - TechNet Articles - United States (English) - TechNet Wiki
NAS vs. SAN - What Are the Differences Between Them
Learn the Difference Between SAN and NAS
iSCSI - Wikipedia
iSCSI – Wikipedia
Was ist eine Logical Unit Number (LUN)?
ISCSI Grundlagen – Thomas-Krenn-Wiki
RAID – Wikipedia
InfiniBand – Wikipedia
Hot-add memory support in Windows Server - Windows 10 hardware dev | Microsoft Docs
Cluster-Aware Updating Overview | Microsoft Docs
Windows Server 2012 File Server Tip: Enable CSV Caching on Scale-Out File Server Clusters | Microsoft Docs
Replikation eines Stretched Clusters mithilfe von freigegebenem Speicher | Microsoft Docs
Cluster-zu-Cluster-Speicherreplikation | Microsoft Docs
Failover-Cluster einrichten mit Windows Server 2012 R2 | WindowsPro
Failover-Cluster: Windows Server 2012 R2 als hochverfügbares iSCSI Target | WindowsPro
Hyper-V Failover-Cluster: Einsatzgebiete, aktiv/aktiv versus aktiv/passiv | WindowsPro
„Konfigurieren und Verwalten des Quorums in einem Failovercluster“ | Microsoft Docs
So stellen Sie Dateiserver hochverfügbar bereit
Direkte Speicherplätze – Übersicht | Microsoft Docs
Deploy Storage Spaces Direct | Microsoft Docs

Download Microsoft iSCSI Software Target 3.3 from Official Microsoft Download Center
Storage Spaces Physical Disk Validation Script (Preview)


Backup & Recovery

20 Best Free Data Recovery Software Tools (April 2021)
The 10 Cleverest Ways to Use Linux to Fix Your Windows PC
List of backup software - Wikipedia
Comparison of backup software - Wikipedia
Backup Strategien - inkrementell, differentiell und Vollbackup
RAID – Thomas-Krenn-Wiki
RAID – Wikipedia
RAID Calculator | Synology Inc.
Langzeitarchivierung – Wikipedia
Acronis - Customer Support & Product Documentation
Veeam Support Technical Documentation
Altaro: Backup-Software für Hyper-V, VMware, Office 365 and Windows Servers
Neufassung der GoBD zunächst zurückgezogen | Steuern | Haufe
Was bedeutet revisionssicher?
GoBD | Haufe
Archivierung Archivierungssysteme - Software und Anbieter
PDF/A – Das Format der Zukunft – Teil1: PDF/A-1 - webPDF Blog


Verschlüsselung

Veracrypt

VeraCrypt | heise Download
Tipps & Tricks: Eigene Dateien verschlüsseln und verstecken - PC Magazin
VeraCrypt - Anleitung zum Daten verschlüsseln -
Sovworks | EDS Veracrypt for Android
VeraCrypt - Free Open source disk encryption with strong security for the Paranoid

Bitlocker

Unlocking BitLocker: Can You Break That Password? | ElcomSoft blog
Bitlocker Unlocked With Joy - Behind The Scenes Windows 10 - Part 1 How To Manage Devices
Introduction to BitLocker: Protecting Your System Disk | ElcomSoft blog
libbde/BitLocker Drive Encryption (BDE) format.asciidoc at main · libyal/libbde · GitHub

enigmail

Enigmail - Thunderbird Mail DE
Enigmail - Einstieg - Thunderbird Mail DE


privacyID3A – flexible, Open Source Multi Factor Authentication (2FA)
MTRIX - Authentication Solutions › MTRIX
IT-Sicherheit ~ Zwei Faktor Authentisierung ~ Verschlüsselung
Lohnt sich der Kauf eines Yubikey NEO?
IT Security Blog - Martin Witkowski zu Themen aus IT, Datenschutz & Sicherheit.
Recommendations for TLS/SSL Cipher Hardening | Acunetix
HOWTO: Disable weak protocols, cipher suites and hashing algorithms on Web Application Proxies, AD FS Servers and Windows Servers running Azure AD Connect - The things that are better left unspoken
Understanding Microsoft Cryptographic Service Providers - PKI Solutions Inc.
Cryptographic Algorithm Validation Program | CSRC
Comparison of disk encryption software - Wikipedia
Disk encryption theory - Wikipedia
Comparison of cryptography libraries - Wikipedia
Secure Hash Algorithms - Wikipedia
X.509 – Wikipedia
Public-Key-Zertifikat – Wikipedia
Verschlüsselungsmodus im Detail / Empfehlung
Rijndael (AES): Blockgröße, Schlüssellänge & Runden
A Complete Guide to AES Encryption (128-bit & 256-bit) - ProPrivacy.com
What Is a Session Key? | Session Keys and TLS Handshakes | Cloudflare
How to Perform Encryption after Diffie Hellman Key Exchange - Information Security Stack Exchange
Cryptography Digital signatures - Tutorialspoint
Digital Signatures - Practical Cryptography for Developers
How Digital Signatures Work: Digitally Signing Messages - Developer.com
TO Blog - IT | Informationssicherheit | Cyber Security | News | Tipps
About CSRC | CSRC
Home DE - CrypTool Portal
Cryptology ePrint Archive: Search Results
Kryptowissen.de - Kryptologie, Kryptographie, Kryptoanalyse
Einführung in die Kryptographie - Invidious
Einführung in die Kryptographie von Christof Paar - Invidious
hashgenerator.de - generate md4 md5 sha1 sha256 sha512 ripemd and whirlpool hashes on the fly
CSR Decoder and Certificate Decoder

PKI-Zertifizierungsstellen

Windows PKI blog | Microsoft Docs
The PKI Guy Blog | PKI Solutions, Inc.
xdot509 Archive Blog
Certutil | Microsoft Docs
Certreq1 | Microsoft Docs
Pre-Fetching | Microsoft Docs
[MS-CRTD]: Certificate Templates Structure | Microsoft Docs
Windows PKI Documentation Reference and Library - TechNet Articles - United States (English) - TechNet Wiki
Public Key Infrastructure Design Guidance - TechNet Articles - United States (English) - TechNet Wiki
BSI - Technische Richtlinien des BSI
Recommendations for TLS/SSL Cipher Hardening | Acunetix
Cipher Suites in TLS/SSL (Schannel SSP) - Win32 apps | Microsoft Docs
Understanding Microsoft Cryptographic Service Providers - PKI Solutions Inc.
Object Identifiers Registry
Microsoft-Kryptografie zugeordnete Objekt-IDs
Cryptographic Algorithm Validation Program | CSRC
Kryptografische Microsoft SDL-Empfehlungen - Security Documentation | Microsoft Docs
Secure Hash Algorithms - Wikipedia
Comparison of cryptography libraries - Wikipedia
Troubleshooting PKI Problems on Windows Vista | Microsoft Docs
https://www.ietf.org/rfc/rfc3647.txt
Protection Profiles : New CC Portal
Common Criteria : New CC Portal
System Store Locations - Win32 apps | Microsoft Docs
Configure Trusted Roots and Disallowed Certificates | Microsoft Docs
PKI Design Considerations: Certificate Revocation and CRL Publishing Strategies | Microsoft Docs
How EffectiveDate (thisupdate), NextUpdate and NextCRLPublish are calculated | Microsoft Docs
Allowing Only Signed Application to Run | Microsoft Docs
„Virtual Smart Card“-Risikominderungsplan für Schwachstellen im TPM
Troy Hunt: Extended Validation Certificates are (Really, Really) Dead
Private Enterprise Number (PEN) Application Form
Bereitstellen der Microsoft Identity Manager-Zertifikatverwaltung | Microsoft Docs
Introducing Project Sauron - Centralised Storage of Windows Events - Domain Controller Edition | Microsoft Docs

Cryptography Tools - Win32 apps | Microsoft Docs
Script Generate an Object Identifier
Win32/Win64 OpenSSL Installer for Windows - Shining Light Productions
Script Generate an Object Identifier
Releases · gentilkiwi/mimikatz · GitHub


Virtuelles-Privazes-Netzwerk-VPN

Virtual private network - Wikipedia EN
Types of Virtual Private Network (VPN) and its Protocols - GeeksforGeeks
VPN mit Azure MFA unter Verwendung der NPS-Erweiterung – Azure Active Directory | Microsoft Docs
Remote work with P2S: Azure VPN Gateway | Microsoft Docs
OpenVPN – Wikipedia DE
OpenVPN - Wikipedia EN
Reference manual for OpenVPN 2.4 | OpenVPN
Community Resources | OpenVPN
Cipher Suites in TLS/SSL (Schannel SSP) - Win32 apps | Microsoft Docs
/docs/man1.1.1/man1/ciphers.html
WireGuard – Wikipedia DE
SoftEther VPN - Wikipedia EN
SoftEther VPN Project - SoftEther VPN Project
Secure Socket Tunneling Protocol - Wikipedia EN
Internet Key Exchange - Wikipedia EN
IPsec – Wikipedia DE
IPsec - Wikipedia EN
Layer 2 Tunneling Protocol – Wikipedia DE
Layer 2 Tunneling Protocol - Wikipedia EN
Point-to-Point Protocol - Wikipedia EN
Point-to-Point Protocol – Wikipedia DE
Networking 101: Transport Layer Security (TLS) - High Performance Browser Networking (O'Reilly)

Extensible Authentication Protocol – Wikipedia DE
Extensible Authentication Protocol - Wikipedia EN
Challenge Handshake Authentication Protocol – Wikipedia DE
Challenge-Handshake Authentication Protocol - Wikipedia EN
Password Authentication Protocol – Wikipedia DE
Password Authentication Protocol - Wikipedia EN
Authentication protocol - Wikipedia EN
Understanding and selecting authentication methods - TechRepublic
Authentication Protocol Overview: OAuth2, SAML, LDAP, RADIUS, Kerberos
Virtual Private Network (VPN): A Very Detailed Guide for Newbies - WHSR
What Is PPTP? (Everything You Need to Know) | CactusVPN
VPN Encryption Types | OpenVPN, IKEv2, PPTP, L2TP/IpSec, SSTP
VPN Protocol Comparison: PPTP vs SSTP vs OpenVPN vs L2TP vs IKEv2
Best VPN Protocols: OpenVPN vs PPTP vs L2TP vs Others (Comparison)
VPN Encryption Types | OpenVPN, IKEv2, PPTP, L2TP/IpSec, SSTP
VPN Protokolle 2021 - Eine ausführliche Übersicht | EXPERTE.de
Welches VPN-Protokoll soll ich verwenden? (Stand 2021)

Richtlinienserver - RADIUS

Extensible Authentication Protocol – Wikipedia DE
Extensible Authentication Protocol - Wikipedia EN
Network Policy Server - Invidious
Choosing the right flavor of 802.1X
28. Configuring RADIUS Authentication for VPN with NPS - Invidious


Internetinformationsdienst-Server-ISS

Web Platform Installer : The Official Microsoft IIS Site
Home : The Official Microsoft IIS Site
Web-Server (IIS) unter Windows 10 installieren und konfigurieren | WindowsPro
SSL Server Test (Powered by Qualys SSL Labs)


Exchange

MSXFAQ - Exchange, Skype for Business, Teams, Office 365, Outlook, Lync, ...
Exchange-Dokumentation | Microsoft Docs
Download Best Practices for Virtualizing Exchange Server 2010 with Windows Server® 2008 R2 Hyper V™ from Official Microsoft Download Center


Sharepoint

Hier erfahren Sie, wie Sie SharePoint Server verwenden. | Microsoft Docs
SharePoint-Dokumentation | Microsoft Docs


SQL

Microsoft SQL-Dokumentation - SQL Server | Microsoft Docs
Technische Dokumentation zu SQL Server - SQL Server | Microsoft Docs


Verwaltung-Remotedienste

Provide remote support to Windows 10 users with Windows Remote Assistance | Digital Citizen
How to enable Remote Desktop in Windows 10 (or Windows 7) | Digital Citizen
What's Different Between Remote Desktop Connection & Windows Remote Assistance? | Digital Citizen
Fernsteuerung: Windows-Remoteunterstützung und Alternativen - WinTotal.de
Remote-Support in Windows 10 mit Quick Assist (Remotehilfe) | WindowsPro
PsExec - Windows Sysinternals | Microsoft Docs
Download AnyDesk for Free
Download Remoteserver-Verwaltungstools für Windows 10 from Official Microsoft Download Center


Mobile device management - Wikipedia
List of Mobile Device Management software - Wikipedia
Aruba | Enterprise Networking- und Sicherheitslösungen
Die 10 sichersten kostenlosen Software-Download-Sites für Windows
The 10 Safest Free Software Download Sites for Windows
Top 20 Free software Download websites on Earth
Top 24 Free Software Download Sites On The Web
30 Best Free Software Download Sites In 2021
Tobias Wrzal - Windows Server - Invidious
Haiko Hertes Windows Server- Invidious
Ein einfaches Netzwerk - ArtikelübersichtEin einfaches Netzwerk
Comparison of Microsoft Windows versions - Wikipedia
SCCM 2012 R2 Step by Step Guide – Prajwal Desai
NirSoft - freeware utilities: password recovery, system utilities, desktop utilities
SCCM Tutorial For Beginners | Step By Step Guide To Learn Microsoft SCCM
Matrix42 Dokumentation
Andi's iT Blog - Startseite
What's the Diff? Archives

Linux Server

Downloads der Linux Bibel Österreich rund um Linux | Linux Bibel Österreich - Zur Startseite
SelfLinux
Linux Vendor Firmware Service LVFS: Home
Linux Administrator PDF Books - LinuxWebTips

LPIC

The LPIC-2 Exam Prep
Topic 105: Shells and Shell Scripting
Topic 104: Devices, Linux Filesystems, Filesystem Hierarchy Standard
Welcome! | tuxcademy-Linux-Material-PDF
Home · appijumbo/Linux-LPIC-1 Wiki · GitHub

Learning

DistroTube - Invidious
theurbanpenguin - Invidious
aminabcd1 - Invidious
Tutorials Daddy - Invidious
TheSkillPedia - Invidious
LearnITGuide Tutorials - Invidious
Professor Messer - Invidious
LiveOverflow - Invidious
LPI 102 2 Installing GRUB - Invidious
#Linux 17 Bootloaders and GRUB 2 | Linux Tutorial for Beginners | reset root password in linux - Invidious
Linux Kernel install and confi... - Invidious
Linux Kernel configure and com... - Invidious
The Complete Linux Course: Beginner to Power User! - Invidious
Debian 10 Linux | Beginners Basics after Install | Run Windows Programs, Change Desktops, and More! - Invidious
30 things to do after installing Debian 10 - Invidious
Linux Tutorial for Beginners: Introduction to Linux Operating System - Invidious
linux server basic configurati... - Invidious
Linux event logging - Invidious
Apache Web Server and HTTPS on Linux - Invidious
Tunneling and Encryption - CompTIA Network+ N10-005: 5.2 - Invidious
VPN Protocols - CompTIA Network+ N10-006 - 1.2 - Invidious
VPN Concentrators - CompTIA Security+ SY0-501 - 2.1 - Invidious
PAP, CHAP, and MS-CHAP - CompTIA Security+ SY0-501 - 4.2 - Invidious


Distributionen

DistroWatch.com: Put the fun back into computing. Use Linux, BSD.
Liste von Linux-Distributionen – Wikipedia
Distrochooser
Comparison of real-time operating systems - Wikipedia
grml.org - Debian Live system / CD for sysadmins and texttool-users
Ubuntu Server - for scale out workloads | Ubuntu
Ubuntu Studio – A free and open operating system for creative people.
NethServer – operating system for the Linux enthusiast
Top 15 Best Security-Centric Linux Distributions of 2020
15 Most Secure Linux Distros for Privacy and Security Concern Users
Home Clear Linux* Project | Clear Linux* Project
Kali Linux | Penetration Testing and Ethical Hacking Linux Distribution
Digital Evidence & forensic Toolkit DEFT - PC-WELT

Dokumentationen

Index of /doc/Documentation/
Debian -- Documentation
Debian -- The Universal Operating System
Debian GNU/Linux Anwenderhandbuch
de/FrontPage - Debian Wiki
FrontPage - Debian Wiki
Deb Multimedia Packages::Home
Debian -- Debian Users' Manuals
Debian GNU/Linux Anwenderhandbuch
Das Debian Administrationshandbuch
Fedora Spins
Fedora Team Silverblue
Get Fedora
Fedoraforum.de - Foren-Übersicht
Fedora Documentation :: Fedora Docs Site
Product Documentation for Red Hat Enterprise Linux 8 - Red Hat Customer Portal
RPM Fusion - RPM Fusion
Red Hat Enterprise Linux 4
Documentation for Red Hat Products - Red Hat Customer Portal
Software & Download Center - Red Hat Customer Portal
Main Page - Linux Mint
Documentation - CentOS Wiki
HowTos - CentOS Wiki
About/Product - CentOS Wiki
Get openSUSE
Overview of guides | openSUSE Documentation
openSUSE Wiki
Security Guide | openSUSE Leap 15.2
SUSE LINUX Documentation
Get Ubuntu | Download | Ubuntu
Home - Ubuntu Wiki
ArchWiki
Arch Linux | Installation | Linux Einstieg
Anleitung für Einsteiger – wiki.archlinux.de
General recommendations - ArchWiki

Troubelshooting-Admin-Securitytools

IT_Security_Tools


index of hacking labs
Cyber Security Challenge Germany
Hacking-Lab.com
Virtual Hacking Labs | IT Security Training Labs & Courses
Hack The Box :: Penetration Testing Labs
12 Best Linux Distributions for Hacking & Pen Testing [2020]
5 penetration test tools to secure your network
Best Hacking Tools Of 2017 For Windows, Linux, And OS X
19 Powerful Penetration Testing Tools (BEST Security Testing Tools Ranks)
What is penetration testing? 17 hacking tools the pros use | CSO Online
How To Hack Android Phones Using Kali Linux 2019
Diese Hacker-Tools sind illegal! - PC-WELT
OWASP Zed Attack Proxy Project - OWASP
OWASP WebGoat
Anleitung: Passwörter und Logins knacken - Der Tutonaut
DROWN Attack
Ethical Hacking Tutorial - Tutorialspoint
Kali Linux Tutorial - Tutorialspoint
Kali Linux installieren und Hacking-Lab aufsetzen
Kali Linux Revealed | Mastering the Penetration Testing Distribution
Official Kali Linux Downloads
OpenVAS - OpenVAS - Open Vulnerability Assessment System
Metasploit
Hashcat Tutorial for Beginners
Install Social Engineering Toolkit (SET) on Windows • Penetration Testing
Home · BloodHoundAD/BloodHound Wiki · GitHub
Releases · gentilkiwi/mimikatz · GitHub
Linux | ITrig
GitHub - CompassSecurity/security_resources: Collection of online security resources
GitHub - sbilly/awesome-security: A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.
Index | tuebix-downloads-2019
Popular Computer Forensics Top 21 Tools [Updated for 2019]
Top 20 Trending Computer Forensics Tools of 2018 | Information Security
Top 20 Free Digital Forensic Investigation Tools for SysAdmins
23 FREE Forensic Investigation Tools for IT Security Expert
14 FREE Operating System for Penetration Testing & Digital Forensics
PowerShell Team, Author at PowerShell
https://digital-forensics.sans.org/
Digital Forensics Incident Response Training
Ratgeber: So führen Sie IT-Forensik in der Praxis ein - computerwoche.de
10 Ways to Stay Current in DFIR - Magnet Forensics
FotoForensics
WiFi Pineapple Nano | c't Magazin

Reverse Engineering

Reverse engineering - Wikipedia
9 Best Reverse Engineering Tools for 2020 [Updated]
The Top 15 Must-Have Books in InfoSec


MISP features and functionalities
Störsender – Wikipedia
Großhandel Hohe Leistung Signale Störsender/Störgerät gute Qualität
Hacks.Guide - Hacks Guide
Seitennavigation - 3DS Hacks Guide

GNOME System Tools - Wikipedia
TCPDUMP/LIBPCAP public repository
Nmap: the Network Mapper - Free Security Scanner
Nmap Tutorial :: network lab
Offene Ports und Anwendungen finden mit netstat, lsof und nmap :: network lab
Technisches Online-Handbuch zur Netzwerkanalyse mit Wireshark
Chapter 12. Zenmap GUI Users' Guide | Nmap Network Scanning


GNU-und Unix-Kommandos

Linux manual pages: alphabetic list of all pages
SS64 Command line reference
LPI Wiki - Commands
Environment variable - Wikipedia
List of Environment Variables in Linux/Unix
Linux List All Environment Variables Command - nixCraft
Sudo Main Page
GNU Core Utilities – Wikipedia
Home · wting/autojump Wiki · GitHub

Texteditoren

List of text editors - Wikipedia
Comparison of text editors - Wikipedia
JED (text editor) - Wikipedia
welcome home : vim online
Vim - LinuxWiki.org - Linux Wiki und Freie Software
GNU Emacs - GNU Project
EmacsWiki: Site Map
MELPA
Atom Manual
Atom for Windows
Install Atom for Linux using the Snap Store | Snapcraft
Visual Studio Code - Code Editing. Redefined

Shells

Bash Reference Manual
Wie man Farbe ins Terminal bringt - ccat und farbige man pages - .:zefanjas:.
Terminal multiplexer - Wikipedia
tmux - Wikipedia
20 best alternatives to tmux as of 2021 - Slant


Speichertechnologien

Master Boot Record – Wikipedia
GUID Partition Table – Wikipedia
Discoverable Partitions Specification
Linux-Partitionen unter Windows › Wiki › ubuntuusers.de
Liste von Dateisystemen – Wikipedia
Comparison of file systems - Wikipedia
All pages - btrfs Wiki
Btrfs - Wikipedia
XFS - Wikipedia
All pages - XFS.org
Logical Volume Manager (Linux) - Wikipedia
Einführung in LVM » ADMIN-Magazin
InfiniBand – Wikipedia
iSCSI - Wikipedia
iSCSI – Wikipedia
iSCSI mit Linux » ADMIN-Magazin
mdadm - Wikipedia EN
A guide to mdadm - Linux Raid Wiki
RAID – Wikipedia
Learn the Difference Between SAN and NAS

Bootloader

Device tree - Bootlin – Embedded Linux and kernel engineering
Kernel- und Treiberprogrammierung mit dem Linux-Kernel – Folge 68
Bootloader – Wikipedia
Arch bootloaders - ArchWiki
Managing EFI Boot Loaders for Linux
Grand Unified Bootloader GRUB – Wikipedia
GRUB - GNU Project - Free Software Foundation
GRUB Legacy - ArchWiki
GRUB 2- ArchWiki
grub2-mkconfig Tutorial – Linux Hint
GRUB 2 - Fedora Project Wiki
How to Configure the GRUB2 Boot Loader’s Settings
systemd-boot - ArchWiki
https://www.kernel.org/doc/Documentation/admin-guide/kernel-parameters.txt
The Linux BootPrompt-HowTo

Kernel & Module

Device tree - Bootlin – Embedded Linux and kernel engineering
Kernel- und Treiberprogrammierung mit dem Linux-Kernel – Folge 68
Linux Kernel – Wikipedia
The Linux Kernel Archives
FAQ - Linux Kernel for Newbies
Linux kernel release 5.x <http://kernel.org/> — The Linux Kernel documentation
The kernel’s command-line parameters — The Linux Kernel documentation
menuconfig - Wikipedia
Xconfig - Wikipedia
Category:Kernel - ArchWiki
Tool zur Visualisierung der vom Linux-Kernel verwendeten Gerätebaumdatei (dtb)? - Javaer101
Old Steps How to compile and install a new Linux kernel
Kernel/Traditional compilation - ArchWiki
Compiler - Wikipedia
How To Build Linux Kernel {Step-By-Step} | phoenixNAP KB
How to Build Linux Kernels
linux-praxis.de Kernel kompilieren
fibel.org 14.6 Kernelkompilierung
Kernel kompilieren
Dynamic Kernel Module Support – Wikipedia DE
Dynamic Kernel Module Support - Wikipedia EN
Kernel Korner - Exploring Dynamic Kernel Module Support (DKMS) | Linux Journal
Pros and Cons of Using DKMS
Kernel-Modul – Wikipedia
Linux Loadable Kernel Module HOWTO
How to load or unload a Linux kernel module | Opensource.com
fibel.org 14. Programminstallation und Kernelmanagement
Packaging/KernelModules/Akmods - RPM Fusion
Compiling Linux Software from Source Code — Guide to Linux for Beginners
How To Compile Software Packages On Linux
How to Install Software from Source Code in Linux [Complete Guide]
Linux Device Drivers, Third Edition [LWN.net]
Searchable Linux Syscall Table for x86 and x86_64 | PyTux

Systemdienste systemd-init

UNIX System V - Wikipedia
SysVinit – Wikipedia
SysVinit to Systemd Cheatsheet - Fedora Project Wiki
systemd – Wikipedia DE
systemd - Wikipedia EN
systemd Documentation
systemd commands - ArchWiki
Packaging:Systemd - Fedora Project Wiki
Das Init-System Systemd, Teil 1 | c't Magazin
Das Init-System Systemd, Teil 2 | c't Magazin
What is a TTY on Linux? (and How to Use the tty Command)
No systemd

freedesktop.org-Software
xdg-utils › Wiki › ubuntuusers.de

Window-Managers Display Managers Desktops

Windows Managers vs Login Managers Vs Display Managers Vs Desktop Environment - Unix & Linux Stack Exchange
DisplayManager - Debian Wiki
24 Linux desktops you need to try | Opensource.com
Linux-Desktops 2020: Welcher passt zu Ihnen? - PC-WELT
Windowing system - Wikipedia
Fenstermanager – Wikipedia
Comparison of X window managers - Wikipedia
Grafik-Hardware für Linux-Anwender | c't Magazin
Wayland
Wayland (Display-Server-Protokoll) – Wikipedia
Wayland (display server protocol) - Wikipedia
negativo17.org – I'm not dumb. I just have a command of thoroughly useless information.
Plasma/Wayland Showstoppers - KDE Community Wiki
X display manager - Wikipedia
Desktop environment - Wikipedia
Comparison of X Window System desktop environments - Wikipedia
GUI-Toolkit – Wikipedia
GTK (Programmbibliothek) – Wikipedia
The GTK Project - A free and open-source cross-platform widget toolkit
dconf › GNOME Konfiguration › Wiki › ubuntuusers.de
GNOME – An easy and elegant way to use your computer, GNOME 3 is designed to put you in control and get things done.
GNOME Core Applications - Wikipedia
Projects/GnomeShellIntegrationForChrome/Installation - GNOME Wiki!
How to Sync GNOME Shell Extensions Between Desktops - OMG! Ubuntu!
Gnome-look.org
GNOME Shell Extensions
CPUFREQ Extension
Unity (user interface) - Wikipedia
Unity Tweak Tool in Launchpad
www.opendesktop.org
Freedesktop.org Specifications
MATE Desktop Environment | MATE
Cinnamon - ArchWiki
KDE Community Home : KDE.org
Plasma - KDE UserBase Wiki
KDE Applications - Wikipedia
Qt | Cross-platform software development for embedded & desktop
KDE Store
Die Entwicklungen bei KDE › Ikhaya › ubuntuusers.de
Beginner's Guide To The Deskop 2 of 5 | X11, Display Manager and Windows Manager - Invidious

Linux-Dateisysteme

Liste von Dateisystemen – Wikipedia
Dateisystem – Wikipedia
Verzeichnisse unter Linux
Filesystem Hierarchy Standard – Wikipedia
FHS Referenced Specifications
Zugriffskontrolle – Wikipedia
Befehlsübersicht › Shell › Wiki › ubuntuusers.de
Overview of NGROUPS_MAX on different UNIX systems
Unix-Dateirechte – Wikipedia
File Permissions and Ownership in Linux – Utilize Windows
A Windows Guy in a Linux World: Users and File Permission
Extended file attributes - Wikipedia EN
Access Control List – Wikipedia DE
Access-control list - Wikipedia EN
Access Control Lists(ACL) in Linux - GeeksforGeeks
How to manage ACLs on Linux - LinuxConfig.org
linux - How to set default file permissions for all folders/files in a directory? - Unix & Linux Stack Exchange
Access Control Lists in Linux | Security and Hardening Guide | openSUSE Leap 15.2
Comparison of file managers - Wikipedia
https://www.kernel.org/doc/Documentation/admin-guide/devices.txt
https://www.kernel.org/doc/Documentation/admin-guide/devices.rst
Disk quota - ArchWiki


Grundlegende Administrative Aufgaben

pool.ntp.org: the internet cluster of ntp servers
Network Time Protocol daemon - ArchWiki
ntpd - Wikipedia
chrony - Wikipedia
chrony – Documentation
chrony – Comparison of NTP implementations
chrony vs. systemd-timesyncd – What are the differences and use cases as NTP clients? - Unix & Linux Stack Exchange
systemd-timesyncd - ArchWiki
OpenNTPD - Wikipedia

systemd-networkd - ArchWiki
NetworkManager - Wikipedia
NetworkManager - ArchWiki
Linux IP Command Ultimate Tutorial with 31 Examples
Linux ip Command Examples - nixCraft
ifconfig - Wikipedia
Polkit – Wikipedia DE
Polkit - Wikipedia EN
PolicyKit - Debian Wiki
Polkit - ArchWiki
DeviceKit
At Command in Linux | Linuxize
Cron- Vixi Cron – Wikipedia
Cron- Vixi Cron - Wikipedia
Cron - ArchWiki
systemd/Timers - ArchWiki
Fcron, eine flexible Cron-Alternative » ADMIN-Magazin
anacron – Wikipedia
Understanding the job control commands in Linux – bg, fg and CTRL+Z – The Geek Diary
Nmap: the Network Mapper - Free Security Scanner
MemTest86 - Official Site of the x86 Memory Testing Tool
Intel CPUs: P-state, C-state, Turbo Boost, CPU frequency, etc.
CPU frequency scaling - ArchWiki
Intel Extreme Tuning Utility (XTU) Undervolting Guide - Notebookcheck.com Tests
Powertop - ArchWiki
TLP - Optimize Linux Laptop Battery Life — TLP 1.3.1 documentation
TLP - ArchWiki
CheckInstall Homepage
Documentation - CUPS.org
avahi - mDNS/DNS-SD
Advanced Linux Sound Architecture AlsaProject
GStreamer: open source multimedia framework

Linux-Installation und Paketverwaltung

Top 100 Linux Downloads der Woche - CHIP
Windows-Software unter Linux nutzen | Tutonaut.de
List of free and open-source software packages - Wikipedia
List of applications/Utilities - ArchWiki
EPEL - Fedora Project Wiki
YaST – Wikipedia EN
Universalpakete | c't | Heise Magazine
Flathub—An app store and build service for Linux
Sandbox · flatpak/flatpak Wiki · GitHub
Snapcraft - Snaps are universal Linux packages
System options | Snapcraft documentation
apps – AppImageHub
AppImages - Generic - Bintray
Arch Linux - Package Search
WineHQ - Run Windows applications on Linux, BSD, Solaris and macOS
Calamares - Calamares
FAI - Fully Automatic Installation
m23, the OpenSource software deployment and management system for Linux / m23, das quelloffene Softwareverteilungs- und Managementsystem für Linux - home/ - default
Zero Install
GNU Package Blurbs - GNU Project - Free Software Foundation


Firewall

Grafische Tools zur Firewall-Konfiguration
Linux Firewall - iptables, netfilter, ufw - Ein Überblick
iptables-nftables-Linux-Magazine
iptables - Wikipedia
Iptables - Die Linux-Firewall professionell konfigurieren | Linux Bibel Österreich - Zur Startseite
Linux-Firewall einrichten: Iptables erklärt - PC-WELT
nftables - Wikipedia
Packet Filtering mit NFtables
Mit Nftables steht ein Nachfolger für den Iptables-Paketfilter bereit - LinuxCommunity
Nftables - Gentoo Wiki
netfilter/iptables project homepage - The netfilter.org project
nftables - ArchWiki
Nftables quick howto – To Linux and beyond !
firewalld - Wikipedia
Firewalld - Fedora Project Wiki
Home | firewalld
firewall-cmd(1) — Arch manual pages
ufw › Wiki › ubuntuusers.de
Firewall
UncomplicatedFirewall - Ubuntu Wiki
ufw in Launchpad
Gufw Firewall
Firewall Builder | Simplifying Firewall Management
Fail2ban – Wikipedia DE
Fail2ban - Wikipedia EN
Fail2ban
Advanced Intrusion Detection Environment – Wikipedia DE
Advanced Intrusion Detection Environment - Wikipedia EN
AIDE - Advanced Intrusion Detection Environment
Home - Greenbone Networks
OpenVAS - OpenVAS - Open Vulnerability Assessment Scanner
Nmap Network Scanning | Nmap Network Scanning
Snort Setup Guides for Emerging Threats Prevention

Watchguard – Wikipedia
Unified Threat Management – Wikipedia
OPNsense® a true open source security platform and more - OPNsense® is a true open source firewall and more
Download pfSense Community Edition

Antivirus

Best Linux Antivirus: Top 10 Reviewed and Compared


Pluggable Authentication Module PAM

Pluggable Authentication Modules – Wikipedia DE
Pluggable authentication module - Wikipedia EN
Linux PAM - Wikipedia EN
Die Pforten zur Linux-Maschine: Pluggable Authentication Modules
PAM is Un American by Michael W Lucas - Invidious
How to Configure and Use PAM in Linux
Linux Password Enforcement with PAM
The Linux PAM System Administrator Guide
Configure and Use Linux-PAM - Like Geeks
Understanding and configuring PAM – IBM Developer
Pluggable Authentication Modules
PAM - LinuxWiki.org - Linux Wiki und Freie Software

Simpel Authentication and Security Layer SASL

Simple Authentication and Security Layer - Wikipedia
Simple Authentication and Security Layer – Wikipedia DE
Cyrus SASL — Cyrus SASL 2.1.27 documentation

Security and Hardening Guide | openSUSE Leap 15.2

Systemsicherheit - Verschlüsselung

Verschlüsselung-Krypthografie


privacyID3A – flexible, Open Source Multi Factor Authentication (2FA)
MTRIX - Authentication Solutions › MTRIX
IT-Sicherheit ~ Zwei Faktor Authentisierung ~ Verschlüsselung
Lohnt sich der Kauf eines Yubikey NEO?
IT Security Blog - Martin Witkowski zu Themen aus IT, Datenschutz & Sicherheit.
Recommendations for TLS/SSL Cipher Hardening | Acunetix
Cryptographic Algorithm Validation Program | CSRC
HOWTO: Disable weak protocols, cipher suites and hashing algorithms on Web Application Proxies, AD FS Servers and Windows Servers running Azure AD Connect - The things that are better left unspoken
Understanding Microsoft Cryptographic Service Providers - PKI Solutions Inc.
Comparison of disk encryption software - Wikipedia
Disk encryption theory - Wikipedia
Comparison of cryptography libraries - Wikipedia
Secure Hash Algorithms - Wikipedia
X.509 – Wikipedia
Public-Key-Zertifikat – Wikipedia
Verschlüsselungsmodus im Detail / Empfehlung
Rijndael (AES): Blockgröße, Schlüssellänge & Runden
A Complete Guide to AES Encryption (128-bit & 256-bit) - ProPrivacy.com
What Is a Session Key? | Session Keys and TLS Handshakes | Cloudflare
How to Perform Encryption after Diffie Hellman Key Exchange - Information Security Stack Exchange
Cryptography Digital signatures - Tutorialspoint
Digital Signatures - Practical Cryptography for Developers
How Digital Signatures Work: Digitally Signing Messages - Developer.com
TO Blog - IT | Informationssicherheit | Cyber Security | News | Tipps
Home DE - CrypTool Portal
Cryptology ePrint Archive: Search Results
Kryptowissen.de - Kryptologie, Kryptographie, Kryptoanalyse
hashgenerator.de - generate md4 md5 sha1 sha256 sha512 ripemd and whirlpool hashes on the fly
CSR Decoder and Certificate Decoder
Einführung in die Kryptographie - Invidious
Einführung in die Kryptographie von Christof Paar - Invidious

Ksplice - Wikipedia
Oracle Ksplice | Ksplice
kGraft - Wikipedia
Canonical Livepatch Service
dm-crypt – Wikipedia
dm-crypt - Wikipedia
Linux Unified Key Setup - Wikipedia
dm-crypt / LUKS: Daten unter Linux sicher verschlüsseln ⋆ Kuketz IT-Security Blog
dm-crypt/Encrypting an entire system - ArchWiki
Festplattenverschlüsselung mit DM-Crypt und Cryptsetup-LUKS: Technik und Anwendung
Milan Broz's blog: TRIM & dm-crypt ... problems?
10 Best File and Disk Encryption Tools for Linux
Daten verschlüsseln mit zuluCrypt (Linux)
Comparison of disk encryption software - Wikipedia
GitHub - mbroz/cryptsetup: Cryptsetup backup upstream repository https://gitlab.com/cryptsetup/cryptsetup
DMCrypt · Wiki · cryptsetup / cryptsetup · GitLab
Librecrypt

Veracrypt

VeraCrypt | heise Download
Tipps & Tricks: Eigene Dateien verschlüsseln und verstecken - PC Magazin
VeraCrypt - Anleitung zum Daten verschlüsseln -
Sovworks | EDS Veracrypt for Android
VeraCrypt - Free Open source disk encryption with strong security for the Paranoid


OpenSSH
SSH authentication sequence and key files : explain - Server Fault
389 Directory Server - Main Page
Pretty Good Privacy - Wikipedia EN
GNU Privacy Guard - Wikipedia EN

enigmail

Enigmail - Thunderbird Mail DE
Enigmail - Einstieg - Thunderbird Mail DE

Sicherheit AppAmor SELinux

SELinux – Wikipedia
Category:SELinux - Fedora Project Wiki
AppArmor - Wikipedia
AppArmor - Community Help Wiki


Protokollierung

Linux Logs Explained - Full overview of Linux Log Files - Plesk
Linux Logging Complete Guide – devconnected
12 Critical Linux Log Files You Must be Monitoring -
Benutzer- und Log-Daten unter Linux verwalten » ADMIN-Magazin
HOWTO: linux logfiles - LinuxCommunity
Linux: So nutzen Sie Logdateien richtig - PC-WELT
11 Open Source-Protokollkollektoren für die zentrale Protokollierung
Linux logging guide: Understanding syslog, rsyslog, syslog-ng, journalctl | by Kshitij Singh | Medium
Logrotate - ArchWiki
Logrotate - Gentoo Wiki
Understanding logrotate utility - Rackspace Developer Center
Logsurfer Project
Syslog - Wikipedia
Syslog - Definition and Details
Syslog
syslog-ng vs. rsyslog comparison
Rsyslog - Wikipedia
The rocket-fast Syslog Server - rsyslog
syslog-ng - Wikipedia
syslog-ng Open Source Edition - Technical Documentation

Monitoring

Surveillance - Wikipedia
Überwachungskamera außen: 10 wertvolle Tipps für einen sicheren Kauf
Rechtliche Regelungen zur Videoüberwachung
Rechtliche Grundlagen der Videoüberwachung in Deutschland
Top 11 Open Source Linux Monitoring tools
Best Linux Monitoring Software & Tools for LINIX/UNIX Based OS for 2020
Most Comprehensive List of Linux Monitoring Tools For SysAdmin
Etc-Verzeichnis mit etckeeper versionieren – Thomas-Krenn-Wiki
top (software) - Wikipedia
10 Useful Alternatives to the Top Utility - LinuxLinks
20 Command Line Tools to Monitor Linux Performance
Top 15 tools to monitor disk IO performance with examples | GoLinuxCloud
5 Great Linux Disk IO monitoring tools - Computer How To
Comparison of network monitoring systems - Wikipedia
collectl
S.M.A.R.T. - ArchWiki
SYSSTAT
collectd - Wikipedia
Start page – collectd – The system statistics collection daemon
RRDtool - Wikipedia
RRDtool - About RRDtool
Cacti (software) - Wikipedia
Cacti® - The Complete RRDTool-based Graphing Solution
Multi Router Traffic Grapher - Wikipedia EN
MRTG - Tobi Oetiker's MRTG - The Multi Router Traffic Grapher
Nagios – Wikipedia DE
Nagios - Wikipedia EN
Icinga – Wikipedia DE
Icinga » Monitor your entire Infrastructure with Icinga
Toolbox: Linux Dash | c't Magazin
Cockpit Project — Cockpit Project
Webmin
Landscape | Home
How To: Monitor Hyper-V with Nagios
Hyper-V Performance Monitoring: Virtuelle Umgebung im Blick
Hyper-V Monitor Gadget - CodePlex Archive
Icinga - Wikipedia
Zabbix.org
Zabbix features overview
Die IT-Monitoring-Software | checkmk
AppDynamics - Wikipedia
GitHub - elastic/kibana: Your window into the Elastic Stack
GitHub - grafana/grafana: The tool for beautiful monitoring and metric analytics & dashboards for Graphite, InfluxDB & Prometheus & More
IT-Monitoring-Features von Veeam ONE
Features - Zentyal Linux Server
UCS - Univention Corporate Server für unkomplizierte IT
Hosting Platform of Choice
Plesk - Innovative Hosting Control Panel

Backup & Recovery

Synchronization and backup programs - ArchWiki
25 Outstanding Backup Utilities for Linux Systems in 2020
10 Best Free and Open Source Linux Data Recovery Tools - LinuxLinks
Apps/DejaDup/Details - GNOME Wiki!
duplicity: Main
Back In Time’s documentation! — Back In Time 1.1.12 documentation
Duplicati
Introduction - Duplicati 2 User's Manual
BorgBackup – Deduplicating archiver with compression and authenticated encryption
Quick Start — Borg - Deduplicating Archiver 1.1.14 documentation
GitHub - borgbase/vorta: Desktop Backup Client for Borg
rdiff-backup
GitHub - rsnapshot/rsnapshot: a tool for backing up your data using rsync (if you want to get help, use https://lists.sourceforge.net/lists/listinfo/rsnapshot-discuss)
EaseUS® | Data Recovery, Backup, Partition Manager & PC Utility Software
Backup Protection - Cyber Protection Solutions - Acronis
MiniTool Products Download Center


Virtualisierung

KVM-Virtual-Machine-Solution
Docker Documentation | Docker Documentation
Bitnami: Packaged Applications for Any Platform - Cloud, Container, Virtual Machine

Verzeichnisdienste

List of LDAP software - Wikipedia
Lightweight Directory Access Protocol – Wikipedia DE
Lightweight Directory Access Protocol - Wikipedia EN
linux install and configure op... - Invidious
OpenLDAP – Wikipedia DE
OpenLDAP-Praxis
RFC 2252 - Lightweight Directory Access Protocol (v3): Attribute Syntax Definitions
OpenLDAP, Main Page
LDAP-Configuration-file
slapd.conf(5)
slapd-config
OpenLDAP Faq-O-Matic
How To Change Account Passwords on an OpenLDAP Server | DigitalOcean
389 Directory Server - Main Page

Remotedienste

OpenSSH
SSH authentication sequence and key files : explain - Server Fault
SSH authentication sequence and key files : explain - Server Fault
11 Best Tools to Access Remote Linux Desktop
Best Linux remote desktop clients of 2021 | TechRadar
Vinagre - Wikipedia
KRDC - KDE Applications
Download VNC Viewer for Linux | VNC® Connect
VNCviewer - Debian Wiki
Die schnelle Remote Desktop Anwendung - AnyDesk
Screencast vokoscreenNG for Windows and Linux


inetd - Wikipedia
xinetd - Wikipedia
Server World - Build Network Server
start [AndSolutions]
GAdmintools – Wikipedia DE
The 10 Top GUI Tools for Linux System Administrators

DNS-Server

Web-Server

Common Gateway Interface – Wikipedia DE
Common Gateway Interface - Wikipedia EN
Media type - Wikipedia EN
Internet Media Type – Wikipedia DE
MIME - Wikipedia EN
MIME-Type/Übersicht – SELFHTML-Wiki
Grundlagen der Webtechnologien
LAMP (Softwarepaket) – Wikipedia
LAMP (software bundle) - Wikipedia
SSL Server Test (Powered by Qualys SSL Labs)
Apache HTTP Server – Wikipedia DE
Apache HTTP Server - Wikipedia EN
Welcome! - The Apache HTTP Server Project
Apache HTTP Server Version 2.5 Documentation - Apache HTTP Server Version 2.5
Apache HTTP Server Version 2.4 Documentation - Apache HTTP Server Version 2.4
Apache Miscellaneous Documentation - Apache HTTP Server Version 2.4
List of Apache modules - Wikipedia
Apache Module anzeigen - aktivieren und deaktivieren - Linux
How to Check Which Apache Modules are Enabled/Loaded in Linux
SSL Server Test (Powered by Qualys SSL Labs)
Getting Started | NGINX
NGINX Docs | Admin Guide

Datei-Server

Mail-Server

Email Blacklist Check - IP Blacklist Check - See if your server is blacklisted
DNSBL Usage Terms - The Spamhaus Project

FTP-Server

Comparison of FTP server software packages - Wikipedia
FTP-Server, -Clients und Online-Tools | 12 kostenlose Downloads | NETZWELT

Kerberos-Server

Kerberos (Protokoll) – Wikipedia DE
Kerberos (protocol) - Wikipedia EN
Wie funktioniert die Kerberos -Authentifizierung?
Kerberos: The Network Authentication Protocol

Public Key Infrastructure

Public key infrastructure - Wikipedia EN
Object Identifiers Registry
OpenSSL – Wikipedia DE
OpenSSL - Wikipedia EN
OpenSSL
OpenSSL
openssl/ciphers.html
PKI Implementation for the Linux Admin - Linux.com
Welcome to CAcert.org
PKI mit Dogtag» ADMIN-Magazin
X-Certificate and KEy management
OpenCA Research Labs - Home Page
SSH authentication sequence and key files : explain - Server Fault

RADIUS-Server

RADIUS - Wikipedia EN
FreeRADIUS
OpenRADIUS Getting Started
FreeRADIUS 'man' pages
Deploying RADIUS: Practices and Principles
Introduction | FreeRADIUS Documentation

SAMBA-Server

Samba (Software) – Wikipedia DE
Samba (software) - Wikipedia EN
SambaWiki
Samba - opening windows to a wider world
The Unofficial Samba HOWTO
Das LDAP-Verzeichnis von Samba 4

NFS-Server

Network File System – Wikipedia DE
Network File System - Wikipedia EN
Was ist das Network File System (NFS)?

Datenbank-Server

MySQL :: Developer Zone
MariaDB Foundation - MariaDB.org

Proxy-Server

Squid – Wikipedia DE
Squid (software) - Wikipedia EN
squid : Optimising Web Delivery

VPN-Server

Virtual private network - Wikipedia EN
Types of Virtual Private Network (VPN) and its Protocols - GeeksforGeeks
OpenVPN – Wikipedia DE
OpenVPN - Wikipedia EN
Reference manual for OpenVPN 2.4 | OpenVPN
Community Resources | OpenVPN
/docs/man1.1.1/man1/ciphers.html
WireGuard – Wikipedia DE
SoftEther VPN - Wikipedia EN
SoftEther VPN Project - SoftEther VPN Project
Secure Socket Tunneling Protocol - Wikipedia EN
Internet Key Exchange - Wikipedia EN
IPsec – Wikipedia DE
IPsec - Wikipedia EN
Layer 2 Tunneling Protocol – Wikipedia DE
Layer 2 Tunneling Protocol - Wikipedia EN
Point-to-Point Protocol – Wikipedia DE
Point-to-Point Protocol - Wikipedia EN

Extensible Authentication Protocol – Wikipedia DE
Extensible Authentication Protocol - Wikipedia EN
Challenge Handshake Authentication Protocol – Wikipedia DE
Challenge-Handshake Authentication Protocol - Wikipedia EN
Password Authentication Protocol – Wikipedia DE
Password Authentication Protocol - Wikipedia EN
Authentication protocol - Wikipedia EN
Authentication Protocol Overview: OAuth2, SAML, LDAP, RADIUS, Kerberos
Understanding and selecting authentication methods - TechRepublic
Virtual Private Network (VPN): A Very Detailed Guide for Newbies - WHSR
What Is PPTP? (Everything You Need to Know) | CactusVPN
VPN Encryption Types | OpenVPN, IKEv2, PPTP, L2TP/IpSec, SSTP
VPN Protocol Comparison: PPTP vs SSTP vs OpenVPN vs L2TP vs IKEv2
Best VPN Protocols: OpenVPN vs PPTP vs L2TP vs Others (Comparison)
VPN Encryption Types | OpenVPN, IKEv2, PPTP, L2TP/IpSec, SSTP
VPN Protokolle 2021 - Eine ausführliche Übersicht | EXPERTE.de
Welches VPN-Protokoll soll ich verwenden? (Stand 2021)


Cloud

7 Best Open Source Cloud Platforms for the Enterprise
Günstiges Cloud Hosting - Hetzner Online GmbH
Cloud - Hetzner Docs
Hetzner Cloud API


Mobile device management - Wikipedia
List of Mobile Device Management software - Wikipedia
Aruba | Enterprise Networking- und Sicherheitslösungen
MiB to MB Conversion Mebibyte to Megabyte Calculator
nixCraft - Linux Tips, Hacks, Tutorials, And Ideas In Blog Format
Learn the Command Line - Master the File System | Codecademy
privacy tools - Verschlüsselung gegen globale Massenüberwachung 🔒
How to Protect Your Privacy on Linux

Magic Quadrant - Wikipedia
Gartner Magic Quadrant & Critical Capabilities | Gartner
Choose the best Software Alternatives- Slant

Portable Software

Portable Software – Wikipedia DE
Portable application - Wikipedia EN
Portable application creators - Wikipedia
5 Portable App Creators To Make Any Software Portable
Create a Portable Version of Any Application in Windows
Portable App Directory (over 400 free) - PortableApps.com


Dateisysteme-Formate & Codierungen

Liste von Dateisystemen – Wikipedia
Dateisystem – Wikipedia
Dateisysteme - Das steckt hinter NTFS und Co. - PC-WELT
SD, SDHC und SDXC: Unterschiede und Vorteile der Speicherkarten
Speed Class Standards for Video Recording - SD Association
A1 vs A2 SanDisk microSD-Karten: Was ist der Unterschied? - MyMemory Blog

Base64 – Wikipedia
INI file - Wikipedia
c# - How to open .dll files to see what is written inside? - Stack Overflow


MiniPC-RasperryPie

TinyBasic
Arduino Official Store | Boards Shields Kits Accessories

Outdoor-Computer

Outdoor Laptops Official Website
Lilliput official website


Gaming-PC

PC Game System Requirements, News And Hardware Test Tools
100 kostenlose Indie-Spiele-Hits - Bilder, Screenshots - COMPUTER BILD SPIELE
Hardware, Notebooks & Software bei Mindfactory.de kaufen
Elektronik & mehr online kaufen | ALTERNATE Online Shop
Gaming PC - Die wichtigsten Komponenten im Detail erläutert
So entschlüsseln Sie die CPU-Namen von Intel - PC-WELT
Bottleneck calculator | First bottleneck calculator | TheBottlenecker
Technikaffe.de
GPUBoss
CPU / Prozessor Vergleich - cpu-monkey
Liste der Intel-Core-i-Prozessoren – Wikipedia
Arbeitsspeicher erweitern: Welcher passt? Was beim Kauf und RAM-Einbau zu beachten ist
Graphics Double Data Rate – Wikipedia
DDR-SDRAM – Wikipedia
NVIDIA PhysX System Software
Feintuning für Prozessorenergieverwaltung in den Energieoptionen von Win7 - Tipps & Tricks
Energieoptionen in Windows optimal einstellen - com! professional
RPG Maker - Wikipedia

Smartphone

Android

7 Open Source Mobile OS Alternatives To Android in 2019
Die besten Custom-ROMs für Android im Überblick | AndroidPIT
12 Best Android Custom ROMs For 2019
List of Linux distributions for smartphones, tablets and wearables
Android application package - Wikipedia
Android package (APK) Datei - Android Wiki
List of Android app stores - Wikipedia
The 5 Best Sites for Safe Android APK Downloads

Eigene-Apps

Index of /eds/assets/distr/ngp/noinet/


F-Droid - Free and Open Source Android App Repository
APK kostenlos online herunterladen | APKPure.com
APKMirror - Free APK Downloads - Download Free Android APKs #APKPLZ
Evozi Apps - Landing Page
OsmAnd - Offline Mobile Maps and Navigation
Android Wiki
XDA-Developers Android Forums
Your Phone Your Data – Android ohne Google?! Teil1 ⋆ Kuketz IT-Security Blog
Android ohne Google: Take back control! Teil1 ⋆ Kuketz IT-Security Blog
Sovworks | EDS Veracrypt for Android
[GUIDE] Full Phone Backup without Unlock or … | Samsung Galaxy Nexus
[INFO] ANDROID DEVICE PARTITIONS and FILESYS… | Android Development and Hacking
Android partitions explained
9 commands to check hard disk partitions and disk space on Linux – BinaryTides
How to Fix "E: Can't mount /sdcard/" Issue on Android Devices
So funktionieren Nandroid-Backups - connect
Heimdall › Wiki › ubuntuusers.de
[INFO] BOOT PROCESS: ANDROID vs. LINUX | XDA Developers Forums
How to Change the Screen Resolution on Your Android: 14 Steps
How to Change Screen Resolution on Android (With and Without Root)
Linkliste Nützlicher Tools rund um das Find 7a – Root / Custom-ROMs / Modding für Oppo Find 7a – Android-Hilfe.de
Oppo Find 7
srini's blog: Unify the memory of Find 7 QHD using LVM(All credits to Dev, Entropy)
Download Official Lineage OS 16 on Oppo Find 7/7a based on Android 9.0 Pie
Oppo find 7 X9006 X9007 X9076 X9077 Stock so… | Oppo Find 7 and 7a
How to guide (9.0 Android) LVM Chinese Unifi… | Oppo Find 7 and 7a
How to "debrick/unbrick"an oppo fi… | Oppo Find 7 and 7a

Backup&Recovery

Top 12 Apps to Backup Your Android Phone Without Root
10 best Android backup apps and other ways to backup Android
Backup erstellen ohne Root - Android Wiki
Android-Backup: So gelingt die Datensicherung
How to backup and restore app data with or without root | NextPit
Best Custom Recovery for Android devices 2021 | TechSphinx


Mehrbenutzer-System

Mehrere Nutzer unter Android hinzufügen: So geht's - PC-WELT
Mehrbenutzer (Multi-User, Multi-Nutzer) System - Android Wiki

App-Berechtigungen

https://developer.android.com/reference/android/Manifest
30 App Permissions To Avoid On Android
What Android app permissions mean and how to use them - Android Authority
5 Smartphone App Permissions You Need to Check Today
Guide to Android App Permissions & How to Use Them Smartly | AVG


Android Forum, Tipps & Tricks, aktuelle News – Android-Hilfe.de

Rooten

To root or not to root, that is the question | NextPit
5 reasons not to root your Android device | NextPit
How to root Android: the complete guide | NextPit
Root auf Android freischalten: Grundlagen und Anleitungen - IONOS
So rooten Sie Ihr Android-Smartphone - PC-WELT
How to Root Android Smartphones and Tablets (and Unroot Them) | Digital Trends
Best 8 Android Root Tools to Get Root Access with or without Computer
Best One Click Root Methods in 2019
Download Android Studio and SDK tools  |  Android Developers
Android software development - Wikipedia
How to install ADB and Fastboot | AndroidPIT
[TOOL]Minimal ADB and Fastboot [2-9-18] | Android Development and Hacking
List of useful ADB and Fastboot commmands for Android
How To Install ADB Driver On Your Windows Computer - Root My Device
How to Discover Hidden Fastboot Commands
usb - ADB Android Device Unauthorized - Stack Overflow
Android rooten | c't | Heise Magazine
How to root your Android phone using Windows 10 and TWRP Recovery | TechRadar
ClockworkMod
[APP][4.0+][ROOT] Flashify | Android Development and Hacking
The Ultimate Guide to Using TWRP: The Only Custom Recovery You'll Ever Need « Android :: Gadget Hacks
TWRP: the complete guide to using Recovery on Android
How to wipe in TWRP properly? | OpenSource Development by Android-Andi @ XDA
How to Install Magisk
Releases · topjohnwu/Magisk · GitHub


CustomRom-compilieren

Android | XDA Developers Forums
Some advice.. | XDA Developers Forums
Build for find7 | LineageOS Wiki
[GUIDE][COMPLETE] Android ROM Development From Source To End | XDA Developers Forums
Building LineageOS for an Unsupported Device. | by Dalton Fury | Medium
Tutorial: Android Internals - Building a Custom ROM, Pt. 1 of 2 - Invidious
HOW TO COMPILE CUSTOM ROMS FROM SOURCE - Invidious
How can I get TWRP for my device? (how to compile TWRP)


Fairphone | The phone that cares for people and planet
Home - F(x)tec Smartphone
Cosmo Communicator - Planet Computers
Gemini PDA - 4G+WiFi - Planet Computers

Apple

Apple Inc. - Wikipedia EN
Macintosh - Wikipedia EN
iPhone - Wikipedia EN
How to Remove or Bypass MDM Profile on iPhone or iPad | by iActivate MDM Bypass Software | Medium

Windows

WP internals
Windows Phone-Bootloader entsperren - Deskmodder.de
Launcher 10: Die Windows 10 Mobile Kachel-Alternative für Android | WindowsUnited
Misc HERE app packages; repacked and retail. - Post #3
Windows Phone Jailbreak (flashen): "Interop Tools" nun offiziell im Microsoft Store | WindowsUnited
HOW TO: get Here Drive+ and Here Maps back on Windows 10 Mobile (Threshold 2/10586.xxx branch) - Windows Central Forums
SquareHome 2 Launcher und die Frage, wie viel Windows Phone auf Android möglich ist | WindowsUnited
Windows Phone 8 Development and Hacking
Interop Tools für Windows Phone: Volle Funktionen nun in der Store-Version! | WindowsUnited


Smartphone Prozessoren - Benchmarkliste - Notebookcheck.com Technik/FAQ
Snapdragon Chips Vergleich & Überblick
Handyvergleich - alle Handydaten vergleichen
Android: Vorinstallierte Apps löschen ohne Root
tipps+tricks zu Windows, Office, iOS uvm.
SIM-Karten Formate: Mini-, Micro- & Nano-SIM alle Formate im Überblick
Speed Class Standards for Video Recording - SD Association


IT-Support-Windows-Clients

Surface

Microsoft Surface Pro 4-Updateverlauf | Surface-Firmwareupdates
Akkuzustand und Akkulaufzeit - Powercfg - Mein-Surface.de

tipps+tricks zu Windows, Office, iOS uvm.
Microsoft Update-Katalog
Microsoft TechNet: Ressourcen für IT-Professionals
Deskmodder Wiki
Sicherheit | heise Download
WinFuture.de - Die ganze Welt der IT
All Sites - Stack Exchange
List of HTTP status codes - Wikipedia
PC-Probleme ade: Problemlöser-Tools für alle Fälle - Bilder, Screenshots - COMPUTER BILD
ID Ransomware
EU-Cleaner · botfrei
VirusTotal
Comodo update funktioniert nicht mehr | Largo-Art
c:\Windows\System32 Files Explained | Symantec Connect
CMTrace - Configuration Manager | Microsoft Docs
Bug Check Code Reference - Windows drivers | Microsoft Docs
Thomas-Krenn-Wiki
Ultimate BIOS Guide: Every Setting Decrypted and Explained! | PC Gamer
BIOS for Beginners | Tom's Hardware
Beep Codes - BIOS Fehler-Meldungen
Die Fehlercodes des Phoenix-BIOS richtig verstehen - PC-WELT
PC piept - das bedeuten die Bios-Töne - PC-WELT
Downloads - ComputerBase
WebRTC Troubleshooter
Feintuning für Prozessorenergieverwaltung in den Energieoptionen von Win7 - Tipps & Tricks
Energieoptionen in Windows optimal einstellen - com! professional
Firefox: Plugins deinstallieren – so gehts – GIGA
DSL-Login: So tragen Sie die Nutzerdaten richtig ein - PC-WELT
Tastenkombinationen Word | Office Wissen

iFixit: Das kostenlose Reparaturhandbuch
Yours for the making - Instructables
Blu-ray- & DVD-Authoring | 5 kostenlose Downloads | NETZWELT

IT-Bücher

Willkommen - dpunkt.verlag
mitp-Verlag | Der Onlineshop für IT, Business und Fotografie
Fachbuch | Hanser Kundencenter
Springer - International führender Wissenschaftsverlag
Startseite • O'Reilly
Stefan Kania IT-Schulungen und Consulting
Feisty Duck: Fine computer security and open source books
dpunkt.openbooks - dpunkt.verlag
Openbooks des Rheinwerk Verlags
Cryptography Engineering - Side Notes
kohnlehome.de | Windows
kohnlehome.de | Linux
LPIC-2 | Lisenet.com :: Linux | Security | Networking
it-grossniklaus.ch
IBM Redbooks
Hacking & Security: Das umfassende Handbuch: Amazon.de: Michael Kofler, André Zingsheim, Klaus Gebeshuber, Markus Widl, Roland Aigner, Thomas Hackner, Stefan Kania, Peter Kloep, Frank Neugebauer: Bücher
Hacking Handbuch: Amazon.de: Dr. Patrick Engebretson: Bücher
Hacken mit Kali-Linux: Schnelleinstieg für Anfänger: Amazon.de: Mark B.: Bücher


CertBase - IT-Pruefungsvorbereitung Online
Aktuelle Events | Karlsruher IT-Sicherheitsinitiative
Bildauflösungen in der Digitalfotografie – Wikipedia
Employee Skills Training Platform Demo | CyberSecurity Training | Security Awareness | Kaspersky Lab
Elektronik-Kompendium.de - Elektronik einfach und leicht verständlich
Werte aus Textdatei in Excel importieren | IT-Service Ruhr

IT_News

IT-Sicherheit

Cybersecurity Conferences 2020 – 2021 [Updated Every Day]
Topics on GitHub · GitHub
Full Disclosure Mailing List
CVE security vulnerability database. Security vulnerabilities, exploits, references and more
Published | Zero Day Initiative
VULNERABILITY LAB - SECURITY VULNERABILITY RESEARCH LABORATORY - Best Bug Bounty Programs, Vulnerability Coordination and Bug Bounty Platform - INDEX
CXSECURITY.COM Free Security List
Browse cve vulnerabilities by date
Cyber Security Resources | SANS Institute
Meldungen - TeleTrusT - Bundesverband IT-Sicherheit e.V. / IT Security Association Germany
National Institute of Standards and Technology | NIST
About CSRC | CSRC
Hasso-Plattner-Institut
Frauenhoferinstitut-Cybersicherheit
Institut für Internet-Sicherheit - if(is): Institut für Internet-Sicherheit
Karlsruher IT-Sicherheitsinitiative (KA-IT-Si)
CertBundInfo
CCC | DNS Howto
Cryptology ePrint Archive: Search Results
Hackaday | Fresh Hacks Every Day
New Links | Hacker News
Slashdot: News for nerds, stuff that matters
Kuketz IT-Security Blog ⋆ IT-Sicherheit | Datenschutz | Hacking
Blog - goSecurity AG
Lab of a Penetration Tester
Blog - goSecurity AG
Security-Insider: IT-Security, Trojaner, Firewall, Antivirus, Netzwerksicherheit
Krebs on Security
Schneier on Security
Synacktiv
heise Security - News, Dienste und Foren zum Thema Computer-Sicherheit heise Security
IT-News | ZDNet.de
Das Security-Forum zu IT-Security, Trojaner, Firewall, Antivirus, Netzwerksicherheit
Latest Topics | ZDNet
Information Security News, IT Security News and Cybersecurity Insights: SecurityWeek
Golem.de: IT-News für Profis
gHacks Technology News
The Hacker News – Most Popular Cyber Security, Hacking News Site
Security News | CSO
Information Security and IT Security News - Infosecurity Magazine
Threatpost | The first stop for security news
soeren-hentzschel.at - Aktuelles zu Mozilla
computerwoche.de - Ihr Wegweiser für die digitale Transformation
Cryptology ePrint Archive: Search Results
Offizieller Blog von Kaspersky Lab
Onlinesicherheit
National Security – The Intercept
Google Online Security Blog
IT-Security-Magazin.de | Online-Sicherheit und mehr
Fluktuationskostenrechner | HUMANQUEST

Datenschutz

Startseite - mobilsicher.de
Start | Digitalcourage
Deutschland sicher im Netz e.V. | Gemeinsam für mehr IT-Sicherheit
Youngdata: Startseite
netzpolitik.org – Plattform für digitale Freiheitsrechte
Logbuch:Netzpolitik | Rückblicke, Einblicke und Ausblicke auf das netzpolitische Geschehen als wöchentlicher Podcast
Internetauftritt des Bundesbeauftragten für den Datenschutz und die Informationsfreiheit - Startseite
Der Landesbeauftragte für den Datenschutz und die Informationsfreiheit Baden-Württemberg | Der Landesbeauftragte für den Datenschutz und die Informationsfreiheit
Datenschutzbeauftragter INFO | Informationen zum Datenschutz
Internetauftritt der Bundesbeauftragten für den Datenschutz und die Informationsfreiheit - Überblick
Blog - Waterline Data
DIN 66399 - Schutzklassen und Sicherheitsstufen | TÜV SÜD GRUPPE
Wirtschaft 2018 - Blossey & Partner Datenschutzberatung
Datenschutz im Unternehmen – Tipps vom Anwalt
Daten-Speicherung.de – minimum data, maximum privacy
Committee 9. ISO Survey of certifications to management system standards - Full results
Newsbox | RDV Online | Fachzeitschrift für Datenschutzrecht
DSGVO - EU Datenschutzgrundverordnung | IHK München
Datenschutzbeauftragter INFO | Informationen zum Datenschutz
ULD
Mitgliedschaft – Berufsverband der Datenschutzbeauftragten Deutschlands (BvD) e.V.
LHR-Magazin: Aktuelle Fälle und Rechtsthemen | LHR Rechtsanwälte Köln
D A T E N S C H U T Z F O R U M

Windows

Blogs

Netz-Weise Dokus PDFs
Active Directory FAQ - Blog der FirstAttribute Gruppe
Active Directory Pro - Tutorials & Training Videos
Blog Archive • Helge Klein
Frankys Web - Microsoft Exchange und Active Directory Blog
IT-Pirate - Ahoy Sailor! Welcome Aboard!
IT Blog | IT Blog
Lab of a Penetration Tester
Blog - goSecurity AG
FB Pro GmbH | Getting Things Done!
DevBlogs PowerShell etc. - Microsoft Developer Blogs
PowerShell | Automating the world one-liner at a time…
Peter Hinchley
Mandie's Memos | Learning about Docker, Kubernetes and other technologies the hard way… so you don't have to.
The PKI Guy Blog | PKI Solutions, Inc.
Wiki - TechNet Wiki
Featured Articles - TechNet Articles - United States (English) - TechNet Wiki
Frequently asked questions - MSDN Search
Blogs - Microsoft Tech Community
Microsoft Tech-Blog Deutschland | TechWiese
Archived MSDN and TechNet Blogs | Microsoft Docs
Group Policy Team Blog | Microsoft Docs
Windows PKI blog | Microsoft Docs
Core Infrastructure and Security Blog - Microsoft Tech Community
Microsoft Security Guidance blog | Microsoft Docs
Channel 9: Videos for developers from the people building Microsoft Products & Services
Windows Archives - RootUsers
Sysadmin - Simple Talk


Aktuelles - Tipps, Tricks und Tools für Microsoft Office Outlook
InfrastrukturHelden.de - Microsoft, Linux, Cloud und mehr
RootUsers - Guides, tutorials, reviews and news for System Administrators.
Security-Insider: IT-Security, Trojaner, Firewall, Antivirus, Netzwerksicherheit
Storage-Insider - das Online-Magazin zu NAS, SAN, Backup & Recovery, SSD, RAID, Cloud-Storage und Archivierung
DataCenter-Insider - das Rechenzentrums-Fachportal zu Software Defined Datacenter, Kühlung, USV, RZ-Netze, Tools, Applikationen, Middleware, OpenStack, Private Cloud, Virtualisierung
IP-Insider - Fachportal für Netzwerktechnik, Routing & Switching, SDN, IP-Kommunikation und UCC
CloudComputing-Insider: Fachportal für Cloud Computing und Software as a Service
Dr. Windows › Am Puls von Microsoft
WindowsArea.de - Das Microsoft Magazin
Top 30 Microsoft Blogs, Websites & Influencers In 2020
WindowsPro | Windows, Virtualisierung und Cloud für Profis
Microsoft TechNet: Ressourcen für IT-Professionals
Active Directory Security – Active Directory & Enterprise Security, Methods to Secure Active Directory, Attack Methods & Effective Defenses, PowerShell, Tech Notes, & Geek Trivia…
Artikel Archive - WinTotal.de
BleepingComputer.com - News, Reviews, and Technical Support
Kategorie:Windows – Thomas-Krenn-Wiki
ITU: Committed to connecting the world

Linux

Blogs

The Linux Foundation – Supporting Open Source Ecosystems
freedesktop.org/wiki/
Magazin | freiesMagazin
LinuxUser - Das Magazin für die Praxis - LinuxUser Community-Edition
Webseiten rund um Linux | Linux Bibel Österreich - Zur Startseite
Appimage-Liste | Linux Bibel Österreich - Zur Startseite

Blog LiBe.net - Windows Linux Know How To
InfrastrukturHelden.de - Microsoft, Linux, Cloud und mehr
Linux.org
Average Linux User | How to install, configure and use Linux.
Linux-Magazin
LinuxLinks - The Linux Portal Site
Jan Grulich – Fedora, KDE, Qt, C++, QML
Planet Igalia
Linux Hardware Reviews, Open-Source Benchmarks & Linux Performance - Phoronix
.:zefanjas:. - open source, web, education
Christian Kellner Blog
TechKnowHow
LinOxide - Linux Howtos, Tips, Guides and Tutorials
Pro-Linux

All Sites - Stack Exchange
media.ccc.de - home
Krypto im Advent | Die Welt der Verschlüsselung entdecken
Vergangene Events | OWASP Germany - Stammtisch Karlsruhe (Karlsruhe, Deutschland) | Meetup
Humble Bundle | game bundles, book bundles, software bundles, and more
Brochures - PCCW Global
KIT – Fakultät für Informatik – Studium und Lehre - Formulare / Dokumente